Search

Your search keyword '"DDoS attacks"' showing total 36 results

Search Constraints

Start Over You searched for: Descriptor "DDoS attacks" Remove constraint Descriptor: "DDoS attacks" Publisher springer nature Remove constraint Publisher: springer nature
36 results on '"DDoS attacks"'

Search Results

1. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.

2. A proactive approach to DDoS attack recognition and preclusion in securing m-health systems.

3. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks.

4. E-SDNN: encoder-stacked deep neural networks for DDOS attack detection.

5. EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks.

6. Resource investment for DDoS attack resistant SDN: a practical assessment.

7. A novel feature-based framework enabling multi-type DDoS attacks detection.

8. QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture.

9. Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things.

10. Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution.

11. Self-Adaptive Lightweight Attention Module-Based BiLSTM Model for Effective Intrusion Detection.

12. Detecting Denial of Service attacks using machine learning algorithms.

13. KS-DDoS: Kafka streams-based classification approach for DDoS attacks.

14. Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks.

15. SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.

16. Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks.

17. SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks.

18. Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List.

19. A feature dimension reduction technology for predicting DDoS intrusion behavior in multimedia internet of things.

20. A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment.

21. SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking.

22. An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks.

23. FCM–SVM based intrusion detection system for cloud computing environment.

24. An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments.

25. Hybrid Algorithm to Detect DDoS Attacks in VANETs.

26. SDN-based DDoS Attack Mitigation Scheme using Convolution Recursively Enhanced Self Organizing Maps.

27. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation.

28. DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment.

29. Network anomaly detection based on probabilistic analysis.

30. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.

31. Performance Modeling and Analysis of the EDoS-Shield Mitigation.

32. DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions.

33. Distributed denial-of-service attacks against HTTP/2 services.

34. Distributed Denial of Service (DDoS) detection by traffic pattern analysis.

35. A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.

36. Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds.

Catalog

Books, media, physical & digital resources