Results 71 to 80 of about 20,777 (211)

Multiplayer game for DDoS attacks resilience in ad hoc networks [PDF]

open access: yes, 2011
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles.
Komninos, N.   +2 more
core   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]

open access: yesJisuanji gongcheng, 2016
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj   +1 more source

An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]

open access: yes, 2019
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core   +1 more source

DDoS victim service containment to minimize the internal collateral damages in cloud computing [PDF]

open access: yes, 2016
Recent Distributed Denial of Service (DDoS) attacks on cloud services demonstrate new attack effects, including collateral and economic losses. In this work, we show that DDoS mitigation methods may not provide the expected timely mitigation due to the ...
Conti, M.   +4 more
core   +1 more source

Pendeteksian Serangan DDoS (Distributed Denial of Service) Menggunakan IDS (Intrusion Detection System) [PDF]

open access: yes, 2016
Teknologi informasi (TI) telah berkembang dengan pesat, terutama dengan adanya jaringan internet yang dapat memudahkan untuk melakukan komunikasi dengan pihak lain, dan penelitian ini di latar belakangi oleh permasalahan rendahnya tingkat pengetahuan ...
ACHMAD FAUJI HILMAWAN, 123040071   +2 more
core  

Characterizing and mitigating the DDoS-as-a-Service phenomenon [PDF]

open access: yes, 2014
Distributed Denial of Service (DDoS) attacks are an increasing threat on the Internet. Until a few years ago, these types of attacks were only launched by people with advanced knowledge of computer networks.
Santanna, José Jair, Sperotto, Anna
core   +3 more sources

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Performance and security testing of network applications [PDF]

open access: yes, 2013
Cieľom tejto diplomovej práce je navrhnúť a realizovať bezpečnostný test na základe skúmania odolnosti testovaného zariadenia voči pôsobeniu distribuovaného útoku odoprenia služby DDoS SYN Flood.
Matej, Michal
core  

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy