Results 161 to 170 of about 20,777 (211)
DDoS attack detection method based on improved convolutional long short-term memory and three-way decision in SDN. [PDF]
Wang H, Yang X, Jia N.
europepmc +1 more source
DDoS attack detection in Edge-IIoT digital twin environment using deep learning approach. [PDF]
Al-Obeidat F +3 more
europepmc +1 more source
Soft actor-critic algorithm and improved GNN model in secure access control of disaggregated optical networks. [PDF]
Zhao Z, Wang Y.
europepmc +1 more source
A Survey of Distributed Denial of Service (DDoS) Attack Mitigation Techniques
openaire +1 more source
Deployable Mechanisms for Distributed Denial-of-Service (DDoS) Attack Mitigation
openaire
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Network and Computer Applications, 2016
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of service (DDoS) attacks are not a new threat, but remain a major security challenge and are a topic of ongoing research interest. Mitigating DDoS attack in cloud presents
Opeyemi Osanaiye +2 more
exaly +3 more sources
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of service (DDoS) attacks are not a new threat, but remain a major security challenge and are a topic of ongoing research interest. Mitigating DDoS attack in cloud presents
Opeyemi Osanaiye +2 more
exaly +3 more sources
Distributed Denial of Service (DDoS) Attacks
2021The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration.
Brij B. Gupta, Amrita Dahiya
openaire +1 more source
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021Cloud computing is the utility sharing platform through which users can rent the services as per their requirements. Users which have low computation resources rent the services from the cloud platform and increase their performances. Anyone can join the cloud computing platforms, this makes it the target of different types of cyberattacks.
Akshat Gaurav +4 more
openaire +3 more sources
The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored
International Cybersecurity Law Review, 2023Abstract The nuisance of cumbersome technological issues is a universal grievance of technology users. Beyond the immediate frustrations of the operational failure, rarely are the compliance implications of technological failures considered by users. Amongst these potential failures is the illegal acquisition of data, inadequate protection of personal ...
Fabian Maximilian Johannes Teichmann +2 more
openaire +2 more sources

