Results 111 to 120 of about 185,090 (283)

Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

open access: yesEURASIP Journal on Advances in Signal Processing, 2009
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput.
Xiapu Luo   +2 more
doaj   +1 more source

Strategic framing of novel ideas: How contestation shapes the evolution of novelty

open access: yesStrategic Entrepreneurship Journal, EarlyView.
Abstract Research Summary Entrepreneurs use strategic framing to gain support for their novel ventures, products, and services. A key challenge entrepreneurs face is that audiences often contest frames that introduce novel ideas, especially when these ideas disrupt audiences' mental and business models.
Janina Klein   +2 more
wiley   +1 more source

Central Bank Digital Currencies, Financial Inclusion, and Privacy: A Normative Perspective

open access: yesSouthern Economic Journal, EarlyView.
ABSTRACT Central bank digital currencies (CBDCs) are a digital form of a nation's money, issued by its central bank. As opposed to other forms of digital money, such as electronic bank balances or cryptocurrencies, they are centrally managed legal tender.
Andrew Allison, Alexander William Salter
wiley   +1 more source

Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation

open access: yesABUAD Journal of Engineering Research and Development
The increasing occurrence of Distributed Denial of Service (DDoS) attacks has caused significant disruptions in global network services, overwhelming targets by flooding them with requests from various sources.
Opeyemi Oreoluwa Asaolu   +3 more
doaj   +1 more source

Review of Recent Detection Methods for HTTP DDoS Attack

open access: yesJournal of Computer Networks and Communications, 2019
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures.
Ghafar A. Jaafar   +2 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN

open access: yesIEEE Access
Network management is a crucial task to maintain modern systems and applications running. Some applications have become vital for society and are expected to have zero downtime.
Daniel M. Brandao Lent   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy