Results 81 to 90 of about 83,142 (315)

MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks [PDF]

open access: yes25th IEEE International Conference on Distributed Computing Systems Workshops, 2005
In this paper, we propose a new approach called MAFIC (malicious flow identification and cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate.
Kwok, YK, Hwang, K, Chen, Y
openaire   +3 more sources

Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) using Ant Colony Optimization Technique

open access: yesInformation Technology and Control, 2020
The Mobile ad-hoc networks are auto configured systems where hubs can travel towards any direction. It doesn’t rely on any other frame to build the framework. Because of its versatility, the black hole is a real security issue to be settled.
Dost Muhammad Khan   +5 more
semanticscholar   +1 more source

On the Deformation Behavior of Metastable CrMnNi Steels Processed by Directed Energy Deposition in Different Temperature Regimes

open access: yesAdvanced Engineering Materials, EarlyView.
In the present study, metastable CrMnNi steels with varying chemical compositions and a concomitantly altered stacking fault energy are processed via directed energy deposition and afterwards tested via tensile tests at different temperatures. The present study shows the influence of the manufacturing process on the elemental deformation mechanisms for
Julia Richter   +8 more
wiley   +1 more source

Intrusion Detection System (IDS) : Investigating Snort Performance in Windows and Ubuntu due to Flooding Attack

open access: yesJournal of Computing Research and Innovation, 2018
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Multimodal Characterization of Sn‐Bi Solder Alloy Solidification Using Synchrotron X‐Ray Microtomography and Energy Dispersive Diffraction

open access: yesAdvanced Engineering Materials, EarlyView.
Real‐time imaging and energy‐dispersive diffraction during solidification of Sn‐Bi alloy interconnect for electronic packaging applications are studied. Sn‐Bi solder alloys have generated significant interest in recent times due to their potential use in electronic packaging.
Amey Luktuke   +3 more
wiley   +1 more source

Removing Homocoupling Defects in Alkoxy/Alkyl‐PBTTT Enhances Polymer:Fullerene Co‐Crystal Formation and Stability

open access: yesAdvanced Functional Materials, EarlyView.
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu   +14 more
wiley   +1 more source

A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]

open access: yes, 2005
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core   +1 more source

Extracorporeal Catalytic Hemoperfusion Therapy for Refractory Septic Shock Using Ceria Nanoparticle‐Embedded Porous Microbeads

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces an extracorporeal hemoperfusion system incorporating porous microbeads embedded with autocatalytic ceria nanoparticles (CeNPs) for targeted reactive oxygen species (ROS) scavenging in septic shock. The blood‐compatible hemoperfusion cartridge demonstrated significant improvements in survival, hemodynamic stability, and organ ...
Pilseon Im   +10 more
wiley   +1 more source

k-fingerprinting: a Robust Scalable Website Fingerprinting Technique [PDF]

open access: yes, 2016
Website fingerprinting enables an attacker to infer which web page a client is browsing through encrypted or anonymized network connections. We present a new website fingerprinting technique based on random decision forests and evaluate performance over ...
Danezis, George, Hayes, Jamie
core   +1 more source

Home - About - Disclaimer - Privacy