Results 31 to 40 of about 503,301 (280)
Denial-of-service in automation systems [PDF]
Security aspects of todaypsilas automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryptographic techniques have been developed that can protect the transmitted data against a malicious interference.
Wolfgang Granzer +2 more
openaire +1 more source
Composite DoS attack model / Jungtinis DoS atakų modelis
Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc.
Simona Ramanauskaitė, Antanas Čenys
doaj +1 more source
Detecting Denial of Service attacks using machine learning algorithms
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj +1 more source
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J. +1 more
core +3 more sources
High-Speed Network DDoS Attack Detection: A Survey
Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data.
Rana M. Abdul Haseeb-ur-rehman +6 more
doaj +1 more source
Deteksi Serangan Denial Of Service Menggunakan Artificial Immune System [PDF]
Salah satu masalah ayng ada pada bidang komputer security adalah serangan Denial of Service (DoS). Sudah banyak dikembangkan, beberapa metode yang dapat digunakan untuk mendeteksi jenis serangan ini, salah satunya adalah anomaly detection.
Heryanto, A. (Ahmad) +1 more
core
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience [PDF]
Security has been a major problem in in-vehicle networks (VNs) in recent years, assaults that broadcast a deluge of packets, including Denial of Service (DoS) and Distributed Denial of Service (DDoS) assaults, might put the network at risk. Consequently,
Ahmad M. Nagm +6 more
doaj +1 more source
Defending Against Denial of Service [PDF]
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...
core

