Results 91 to 100 of about 117,160 (225)
Leader-follower cyber secure consensus problem in cybersecurity is crucial as it directly addresses the need for secure and stable communication in a networked system, which is paramount in safeguarding against cyber threats like denial-of-service ...
Asad Khan +5 more
doaj +1 more source
Business and social evaluation of denial of service attacks in view of scaling economic counter-measures [PDF]
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks.
Pau, Louis-François
core +1 more source
Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks. [PDF]
Amma NGB, Selvakumar S.
europepmc +1 more source
TRAP: A Three-Way Handshake Server for TCP Connection Establishment
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down.
Fu-Hau Hsu +5 more
doaj +1 more source
Review of Recent Detection Methods for HTTP DDoS Attack
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures.
Ghafar A. Jaafar +2 more
doaj +1 more source
Coding-based distributed filtering for cyber–physical systems under denial of service attacks
This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems. A particular feature of our work is that we consider systems in which the state is constrained by saturation.
Shuang Feng +4 more
doaj +1 more source
A real-time machine-learning model for detecting and mitigating DDoS attacks
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most lethal cyber threats in this world, which make an online service unavailable to its legitimate users by overwhelming the service provider’s resources.
Mohammad Fathian, Alireza Seifousadati
doaj +1 more source
Intelligent Prevention of DDoS Attacks using Reinforcement Learning and Smart Contracts
(Distributed) Denial-of-Service (DoS/DDoS) attacks are among the most dangerous cybersecurity threats to computer networks. Lately, blockchain and artificial intelligence (AI) cyberdefense applications have successfully been implemented to identify ...
Emily Struble +2 more
doaj +1 more source
Distributed Denial of Service Attack and its Countermeasures [PDF]
Akash Sharma +4 more
openaire +1 more source
The increasing prevalence and sophistication of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks present significant challenges in ensuring the security and stability of modern networked systems.
V. Selva Kumar +5 more
doaj +1 more source

