Search

Your search keyword '"denial of service"' showing total 1,069 results

Search Constraints

Start Over You searched for: Descriptor "denial of service" Remove constraint Descriptor: "denial of service"
1,069 results on '"denial of service"'

Search Results

2. Intrusion detection and prevention using Bayesian decision with fuzzy logic system.

3. Resilient adaptive event-triggered containment control of nonlinear multi-agent system under concurrent DoS attacks and disturbances.

4. Future Directions for Secure IoT Frameworks: Insights from Blockchain-Based Solutions: A Comprehensive Review and Future Analysis.

5. Secure interface architecture for the software defined system on wafer

6. A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures.

7. 面向软件定义晶上系统的安全互连接口架构.

8. Security establishment using deep convolutional network model in cyber-physical systems.

9. Detection and Mitigation of Denial of Service Attacks in Internet of Things Networks.

10. Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach.

11. Denial of Service Attack Prevention and Mitigation for Secure Access in IoT GPS-based Intelligent Transportation Systems.

12. DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments.

13. Detecting DoS Attacks through Synthetic User Behavior with Long Short-Term Memory Network.

14. Simulation of DOS Attacks Mitigation in Software Defined Network Architecture using Load Balancing Algorithm.

15. Understanding and Classifying Permanent Denial-of-Service Attacks.

16. Predicting DoS-Probe-R2L-U2R Intrusions in Wireless Sensor Networks Using an Ensemble Deep Learning Model

17. Intrusion Detection System Utilizing Machine Learning Classifier Algorithms and Linear Discriminative Analysis

18. An Improved Detection System Using Genetic Algorithm and Decision Tree

19. Misdirection Attack in Wireless Sensor Network Using Threshold Method

20. A Study on Smart Contract Security Vulnerabilities

21. A Survey on Anomaly Detection in Network with ML Techniques

22. Performance Evaluation of Machine Learning Models for Intrusion Detection in Wireless Sensor Networks: A Case Study Using the WSN DS Dataset

23. On the Use of Low-Cost IoT Devices to Perpetrate Slow DoS Attacks

24. Understanding and Classifying Permanent Denial-of-Service Attacks

26. Securing the Fog Computing Environment and Enhancing Resource Allocation.

27. Successful intrusion detection with a single deep autoencoder: theory and practice.

28. A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

30. A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures

31. Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection.

32. 列车控制系统的抗拒绝服务攻击弹性控制策略.

33. Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks.

34. Ethical and Legal Considerations in Balancing Mental Health of Sexual and Gender Minority Students and Parental Consent.

35. Movement Mode Harmony Search Based Multi-objective Firefly Algorithm Feature Selection for Detecting the Security Threats in Virtual Machine.

36. Effective network intrusion detection using stacking-based ensemble approach.

37. Ethereum Smart Home for Denial of Service and Single Point of Failure.

39. Trust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computing

40. Physical Layer Parameters for Jamming Attack Detection in VANETs: A Long Short Term Memory Approach

41. Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks

42. IoT Security Using Machine Learning Techniques

44. Intrusion detection in big data environment using hybrid deep learning algorithm (VAE-CNN).

45. A Wrapper Feature Selection Based Hybrid Deep Learning Model for DDoS Detection in a Network with NFV Behaviors.

46. Countermeasures of interest flooding attack in named data networking: A survey.

47. Design and analysis of data link impersonation attack for wired LAN application layer services.

49. A Novel Mechanism for Misbehavior Detection in Vehicular Networks

50. Prevention of Controller Area Network (CAN) Attacks on Electric Autonomous Vehicles.

Catalog

Books, media, physical & digital resources