Results 81 to 90 of about 83,142 (315)
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks [PDF]
In this paper, we propose a new approach called MAFIC (malicious flow identification and cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate.
Kwok, YK, Hwang, K, Chen, Y
openaire +3 more sources
The Mobile ad-hoc networks are auto configured systems where hubs can travel towards any direction. It doesn’t rely on any other frame to build the framework. Because of its versatility, the black hole is a real security issue to be settled.
Dost Muhammad Khan+5 more
semanticscholar +1 more source
In the present study, metastable CrMnNi steels with varying chemical compositions and a concomitantly altered stacking fault energy are processed via directed energy deposition and afterwards tested via tensile tests at different temperatures. The present study shows the influence of the manufacturing process on the elemental deformation mechanisms for
Julia Richter+8 more
wiley +1 more source
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta+73 more
core +1 more source
Real‐time imaging and energy‐dispersive diffraction during solidification of Sn‐Bi alloy interconnect for electronic packaging applications are studied. Sn‐Bi solder alloys have generated significant interest in recent times due to their potential use in electronic packaging.
Amey Luktuke+3 more
wiley +1 more source
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu+14 more
wiley +1 more source
A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core +1 more source
This study introduces an extracorporeal hemoperfusion system incorporating porous microbeads embedded with autocatalytic ceria nanoparticles (CeNPs) for targeted reactive oxygen species (ROS) scavenging in septic shock. The blood‐compatible hemoperfusion cartridge demonstrated significant improvements in survival, hemodynamic stability, and organ ...
Pilseon Im+10 more
wiley +1 more source
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique [PDF]
Website fingerprinting enables an attacker to infer which web page a client is browsing through encrypted or anonymized network connections. We present a new website fingerprinting technique based on random decision forests and evaluate performance over ...
Danezis, George, Hayes, Jamie
core +1 more source