scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "DENIAL of service attacks"

1 - 10 of 6,501 results for
 "DENIAL of service attacks"
Results per page:

Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p1403-1416. 14p.

Abstract:The emergence of a new network architecture, known as Software Defined Networking (SDN), in the last two decades has overcome some drawbacks of traditional networks in terms of performance, scalability, reliability, security, and network management. Ho...

View details

Comprehensive DDoS Attack Classification Using Machine Learning Algorithms.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p577-594. 18p.

Abstract:The fast development of Internet technologies ignited the growth of techniques for information security that protect data, networks, systems, and applications from various threats. There are many types of threats. The dedicated denial of service attack...

View details

CAN Signal Extinction-based DoS Attack on In-Vehicle Network.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 9/26/2022, p1-10. 10p.

Abstract:As automobiles become more electrified, more and more Electronic Control Units (ECU) are installed in vehicles. ECUs communicate with each other through dedicated protocols such as a controller area network (CAN), but these protocols do not have their ...

View details

A SYN Flood Attack Detection Method Based on Hierarchical Multihead Self-Attention Mechanism.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 9/14/2022, p1-13. 13p.

Abstract:Existing SYN flood attack detection methods have obvious problems such as poor feature selectivity, weak generalization ability, easy overfitting, and low accuracy during training. In the paper, we present a SYN flood attack detection method based on t...

View details

Recurrent and Deep Learning Neural Network Models for DDoS Attack Detection.

Publication Type:Academic Journal

Source(s):Journal of Sensors. 9/10/2022, p1-21. 21p.

Abstract:Distributed denial of service (DDoS) attack is a subclass of denial of service attack that performs severe attack in a cloud computing environment. It makes a malicious attempt to disturb the usual services of any network or server by using botnets. He...

View details

A Consensus-Based Distributed Two-Layer Control Strategy with Predictive Compensation for Islanded Microgrid CPS against DoS Attack.

Publication Type:Academic Journal

Source(s):International Transactions on Electrical Energy Systems. 9/8/2022, p1-15. 15p.

Abstract:Summary.Aiming at the problems of insufficient scalability and slow response speed of the traditional three-layer control structure based on the time scale, this study proposes a distributed two-layer control structure. The primary control uses traditi...

View details

Lightweight Authentication Protocol Based on Physical Unclonable Function.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p5031-5040. 10p.

Abstract:In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed ...

View details

ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 8/21/2022, p1-16. 16p.

Abstract:The Internet of Things (IoT) is a complicated security feature in which datagrams are protected by integrity, confidentiality, and authentication services. The network is protected from external interruptions and intrusions. Because IoT devices run wit...

View details

GLD-Net: Deep Learning to Detect DDoS Attack via Topological and Traffic Feature Fusion.

Publication Type:Academic Journal

Source(s):Computational Intelligence & Neuroscience. 8/16/2022, p1-20. 20p.

Abstract:Distributed denial of service (DDoS) attacks are the most common means of cyberattacks against infrastructure, and detection is the first step in combating them. The current DDoS detection mainly uses the improvement or fusion of machine learning and d...

View details

DI-ADS: A Deep Intelligent Distributed Denial of Service Attack Detection Scheme for Fog-Based IoT Applications.

Publication Type:Academic Journal

Source(s):Mathematical Problems in Engineering. 8/8/2022, p1-17. 17p.

Abstract:Nowadays, fog computing plays a very vital role in providing many services to end-based IoT (Internet of Things) systems. The end IoT devices communicate with the middle layer fog nodes and to the above cloud layer to process the user tasks. However, t...

View details

banner_970x250 (970x250)

sponsored