Results 151 to 160 of about 117,160 (225)
Some of the next articles are maybe not open access.
Bandwidth Distributed Denial of Service: Attacks and Defenses
IEEE Security and Privacy, 2014The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS attacks have employed relatively crude, inefficient, brute force mechanisms; future attacks might be significantly more effective and harmful.
Amir Herzberg
exaly +2 more sources
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc.
Zawar Shah +2 more
exaly +2 more sources
2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), 2023
The Distributed Denial of Service (DDoS) attack is a common type of cyber-attack that targets computer networks. When a hostile user seeks to prohibit access to a service by overwhelming the system with data that is not intended, this is an example of ...
R.Karthiga +5 more
semanticscholar +1 more source
The Distributed Denial of Service (DDoS) attack is a common type of cyber-attack that targets computer networks. When a hostile user seeks to prohibit access to a service by overwhelming the system with data that is not intended, this is an example of ...
R.Karthiga +5 more
semanticscholar +1 more source
Classification of Distributed Denial of Service Attacks in VANET: A Survey
Wireless Personal Communications, 2023K. Vamshi Krishna, Ganesh Reddy Karri
openaire +2 more sources
IEEE Wireless Communications Letters, 2022
Network slicing is one of the main enablers of the fifth-generation (5G) cellular network. However, it is susceptible to security threats such as distributed denial of service (DDoS) attacks.
N. Kuadey +4 more
semanticscholar +1 more source
Network slicing is one of the main enablers of the fifth-generation (5G) cellular network. However, it is susceptible to security threats such as distributed denial of service (DDoS) attacks.
N. Kuadey +4 more
semanticscholar +1 more source
Concurrency and Computation, 2022
Cloud computing offers comfortable service to business sectors as they can concentrate on their products. Over the internet, cloud computing is liable to various security threats and attacks which is a primary obstacle to the growth of cloud computing ...
Sumathi Sokkalingam, R. Ramakrishnan
semanticscholar +1 more source
Cloud computing offers comfortable service to business sectors as they can concentrate on their products. Over the internet, cloud computing is liable to various security threats and attacks which is a primary obstacle to the growth of cloud computing ...
Sumathi Sokkalingam, R. Ramakrishnan
semanticscholar +1 more source
Journal of the Institution of Electronics and Telecommunication Engineers, 2022
Software-Defined Networking (SDN) offers an innovative model over the separation of the data plane, control plane and management plane. This separation would result in more effective network management, including cost reductions for hardware and manpower,
J. Ramprasath +2 more
semanticscholar +1 more source
Software-Defined Networking (SDN) offers an innovative model over the separation of the data plane, control plane and management plane. This separation would result in more effective network management, including cost reductions for hardware and manpower,
J. Ramprasath +2 more
semanticscholar +1 more source
Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries
IEEE Transactions on Cybernetics, 2020This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries.
Wenying Xu +2 more
exaly +2 more sources
IEEE transactions on intelligent transportation systems (Print), 2023
The security control of a vehicle platoon depends on the network topology and communication quality. Denial of service (DoS) attacks force vehicle formations to destabilize by disrupting digital communications between vehicles.
N. Zhao +4 more
semanticscholar +1 more source
The security control of a vehicle platoon depends on the network topology and communication quality. Denial of service (DoS) attacks force vehicle formations to destabilize by disrupting digital communications between vehicles.
N. Zhao +4 more
semanticscholar +1 more source

