Search

Your search keyword '"DDoS attacks"' showing total 600 results

Search Constraints

Start Over You searched for: Descriptor "DDoS attacks" Remove constraint Descriptor: "DDoS attacks"
600 results on '"DDoS attacks"'

Search Results

51. A Filtering Model for Evidence Gathering in an SDN-Oriented Digital Forensic and Incident Response Context

52. Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model

53. Evolving Malware and DDoS Attacks: Decadal Longitudinal Study

54. 2019–2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques

56. Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment

58. Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems.

59. K‐DDoS‐SDN: A distributed DDoS attacks detection approach for protecting SDN environment.

60. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks.

61. Ensemble-RNN: A Robust Framework for DDoS Detection in Cloud Environment.

62. Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment.

63. Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks.

64. DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy.

65. Eye-Net: A Low-Complexity Distributed Denial of Service Attack-Detection System Based on Multilayer Perceptron

66. AHAC: Advanced Network-Hiding Access Control Framework

67. An Approach to Prevent DDoS Attack Using Real-Time Access Logs Analysis

70. Detection of DDoS Attacks in Software Defined Networking Using Machine Learning Models

73. Research on the Mechanism of Cooperative Defense Against DDoS Attacks Based on Game Theory

74. An SDN-Based DDoS Traffic Generation, Collection and Classification Using Machine Learning Techniques

75. Effect of Feature Selection Techniques on Machine Learning-Based Prediction Models: A Case Study on DDoS Attack in IoT-Based Networks

76. Ensembled Machine Learning Techniques for DDoS Detection in SDN

77. Analysis of Mirai Malware and Its Components

81. DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing

82. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks

83. DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy

84. Improving distributed denial of service attack detection using supervised machine learning

85. Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks.

86. Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment.

87. GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture.

88. Machine and deep learning techniques for detecting internet protocol version six attacks: a review.

89. Detection of DDoS attack in IoT traffic using ensemble machine learning techniques.

90. DEVELOPMENT OF HYBRID INTRUSION DETECTION SYSTEM BASED ON SURICATA WITH PFSENSE METHOD FOR HIGH REDUCTION OF DDOS ATTACKS ON IPV6 NETWORKS.

91. Analyzing Miners' Dynamic Equilibrium in Blockchain Networks under DDoS Attacks.

92. A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment.

93. Comparative Study of AI-Enabled DDoS Detection Technologies in SDN.

94. DDoS Attack Detection using Back Propagation Neural Network Optimized by Bacterial Colony Optimization.

95. Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing

96. A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks.

97. Resource investment for DDoS attack resistant SDN: a practical assessment.

98. Real-Time Detection of DDoS Attacks Based on Random Forest in SDN.

99. Handling HTTP Flood Attacks in High-Load Applications Using Akka Actors Model.

100. CNN-AttBiLSTM Mechanism: A DDoS Attack Detection Method Based on Attention Mechanism and CNN-BiLSTM

Catalog

Books, media, physical & digital resources