Search

Your search keyword '"DENIAL of service attacks"' showing total 8,967 results

Search Constraints

Start Over You searched for: Descriptor "DENIAL of service attacks" Remove constraint Descriptor: "DENIAL of service attacks" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
8,967 results on '"DENIAL of service attacks"'

Search Results

1. Improving the accuracy of the intrusion detection system in the detection of DoS attacks using one class SVM and comparison with SVM.

2. Improving the accuracy of the intrusion detection system in the detection of DoS attacks using Naive Bayes and comparison with SVM.

3. Analysis and detection of DoS attacks using J48 algorithm compared with logistic regression algorithm to improve the detection rate.

4. Design of intrusion detection system for wireless ad-hoc network in the detection of DOS attack using one class SVM with Bayesian network feature selection comparing with information gain algorithm.

5. Attributes based access control mechanism using smart contracts against denial of service attacks in SDN.

6. Memory event‐triggered mechanism based switching‐like control for CPSs under DoS attack.

7. Leader‐following consensus control for feedforward nonlinear multiagent systems under DoS attacks with attack detection delays.

8. Security establishment using deep convolutional network model in cyber-physical systems.

9. Adaptive neural network‐based security asynchronous control for uncertain Markov jump power systems with dead zone under DoS attack.

10. Security dissipative control for interval type‐2 fuzzy hidden Markovian jump systems under event‐triggered scheme.

11. IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem.

12. The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks.

13. 车联网基于稀疏用户环境的LBS 隐私保护方案.

14. P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch.

15. Timely detection of DDoS attacks in IoT with dimensionality reduction.

16. Detection and Mitigation of Denial of Service Attacks in Internet of Things Networks.

17. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.

18. Adaptive secure lateral control of autonomous electric vehicles under denial-of-service attacks.

19. Prevention of DDoS attacks: a comprehensive review and future directions.

20. DDOS ATTACKS DETECTION USING DIFFERENT DECISION TREE ALGORITHMS.

21. Adaptive event‐triggered control and observer design for discrete‐time nonlinear Markov jump systems with DoS attacks using policy iteration‐based adaptive dynamic programming.

22. A Novel Approach to DDoS Detection in Multi-Controller SDNs: Adaptive Learning Models and Real-Time Feedback for Enhanced IoT Security.

23. Malicious Source Detection and Threats Mitigation in Named Data Networking Using Deep Learning.

24. DDoS Attacks Detection with Half Autoencoder-Stacked Deep Neural Network.

25. IHKM: an improved hierarchical key management scheme for wireless sensor network.

26. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

27. A novel CNN‐based approach for detection and classification of DDoS attacks.

28. Distributed event‐triggered consensus control for multi‐agent systems under independent DoS attacks: A randomized transmission approach.

29. Enhancing Cyber-Physical Resiliency of Microgrid Control under Denial-of-Service Attack with Digital Twins.

30. Data‐driven prescribed performance platooning sliding mode control under DoS attacks.

31. EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.

32. Improving cyber-physical-power system stability through hardware-in-loop co-simulation platform for real-time cyber attack analysis.

33. Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack.

34. An entropy and machine learning based approach for DDoS attacks detection in software defined networks.

35. Dynamic event‐triggered leader‐following bipartite consensus of second‐order multi‐agent systems under DoS attacks.

36. Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection.

37. Asynchronous control of continuous‐time switched systems with all unstable modes under DoS attacks.

38. Applying machine learning enabled myriad fragment empirical modes in 5G communications to detect profile injection attacks.

39. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.

40. FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation.

41. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks.

42. Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking.

43. Filter design for cyber‐physical systems against DoS attacks and unreliable networks: A Markovian approach.

44. Induced attack on formation control of multiagent systems with prescribed reference trajectories.

45. Fixed‐time consensus of networked Euler–Lagrange systems over event‐based communication under DoS attacks.

46. Secure output consensus for multi-agent systems under edge-based event-trigger against denial-of-service.

47. Enhancing Mobile Ad Hoc Network Security: An Anomaly Detection Approach Using Support Vector Machine for Black-Hole Attack Detection.

48. A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures.

49. iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF.

50. For Robust DDoS Attack Detection by IDS: Smart Feature Selection and Data Imbalance Management Strategies.

Catalog

Books, media, physical & digital resources