Results 91 to 100 of about 214,208 (273)
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core +1 more source
A Survey of Distributed Denial of Service Attacks and Defenses
A distributed denial-of-service (DDoS) attack is an attack wherein multiple compromised computer systems flood the bandwidth and/or resources of a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
openaire +2 more sources
ABSTRACT Despite more than 20 years of research into sustainable tourism, the environmental impact of the UK hospitality sector remains high. A growing body of research into the concept of a circular economy (CE) demonstrates that transitioning to this way of working has significant benefits both for the environment and business outcomes.
Danielle Farrow +2 more
wiley +1 more source
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph.
José Roberto Castilho Piqueira +3 more
doaj +1 more source
Greens in Regulation: Biodiversity Strategy Implementation Across the Golf Industry
ABSTRACT Although much of the business and biodiversity literature focuses on extractive industries, we turn our attention to the golf industry. Golf courses occupy millions of acres globally, yet biodiversity strategy implementation across the golf industry remains understudied.
Jordan P. Howell, Jordan Moore
wiley +1 more source
The popularity of cloud computing, with its incredible scalability and accessibility, has already welcomed a new era of innovation. Consumers who subscribe to a cloud-based service and use the associated pay-as-you-go features have unlimited access to ...
Yongqiang Shang
doaj +1 more source
DENIAL OF SERVICE ATTACKS [PDF]
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work.
Alexandru Enaceanu
core
ABSTRACT Although firms that integrate a sustainability orientation (SO) may experience a significant improvement in their resource efficiency, many, particularly small‐ and medium‐sized enterprises (SMEs), still struggle with the complexities of incorporating sustainability into their business models.
Michael Adu Kwarteng +3 more
wiley +1 more source
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets [PDF]
—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks.
Bita Amirshahi, Ali Ahangari
doaj
ABSTRACT The role of academia in shaping the Sustainable Development Goals (SDGs) remains insufficiently understood. This study examines how SDG discourse is constructed within accounting and business research by integrating bibliometric analysis with a systematic review of 731 peer‐reviewed articles published between 2020 and 2024.
Silvia Panfilo +2 more
wiley +1 more source

