Search

Your search keyword '"dos"' showing total 2,308 results

Search Constraints

Start Over You searched for: Descriptor "dos" Remove constraint Descriptor: "dos"
2,308 results on '"dos"'

Search Results

1. Metallurgical, mechanical, and corrosion behavior of AISI 304L joints welded using variable arc energy inputs and subjected to thermal aging.

2. Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review.

3. Analysing the impact of Dy dopants on Zn-based hydroxyapatites: modelling and characterization perspectives.

4. Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System.

5. A Study of Android Security Vulnerabilities and Their Future Prospects

6. Enhancement of nonlinear optical response of 26Adamanzane by doping with alkali metals exohedrally and alkaline earth metals endohedrally: a DFT study.

7. Email bombing attack detection and mitigation using machine learning.

8. Band structure study of pure and doped anatase titanium dioxide (TiO2) using first-principle-calculations: role of atomic mass of transition metal elements (TME) on band gap reduction.

9. Structure and properties of 4a,5,7a, 8-tetrahydro-4H-imidazolo [4,5-b] [1, 2, 5] oxadiazolo [3,4-e] pyrazine-6 (7H)-ketone based energetic derivatives.

10. Machine Learning for DoS Attack Detection in IoT Systems.

11. Structural and electronic properties of Mo‐decorated graphene, reduced graphene and reduced graphene oxide: a DFT calculation.

12. DoS and DDoS Attacks on Internet of Things and Their Detection by Machine Learning Algorithms.

13. Rap-Densenet Framework for Network Attack Detection and Classification.

14. Theoretical Study on Electronic Properties of BN Dimers Doped Graphene Quantum dots.

15. UAV networks DoS attacks detection using artificial intelligence based on weighted machine learning

16. Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks

17. Novel Authentication Scheme to Increase Security of Vehicular Ad Hoc Networks

18. Detecting DoS Outbreaks in Cloud Environment Using Machine Learning Algorithms in Hadoop Cluster

19. Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames

20. Firmware-Based DoS Attacks in Wireless Sensor Network

21. DoS and DDoS Cyberthreats Detection in Drone Networks

23. Thermoelectric Properties of LiYSi Half-Heusler Alloy

24. Perioperative chemotherapy with docetaxel plus oxaliplatin and S-1 (DOS) versus oxaliplatin plus S-1 (SOX) for the treatment of locally advanced gastric or gastro-esophageal junction adenocarcinoma (MATCH): an open-label, randomized, phase 2 clinical trial

25. Comprehensive performance analysis of perovskite solar cells based on different crystalline structures of MAPbI3.

26. A DFT Study on Armchair Nanoribbon Structures of TiN, ZrN, and HfN.

27. ICMPv6-based DDoS Flooding-Attack Detection Using Machine and Deep Learning Techniques.

28. A Computational Insight on the Effect of Doping of Transition Metals and Group V Elements on the Electronic Properties of Phosphorene.

29. A DFT Based Approach for NO2 Sensing Using Vander Wall Hetero Monolayer.

30. Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System.

31. prueba 2

32. Physical analysis of aspirin in different phases and states using density functional theory

33. Dataset on the crystal structure and electronic properties of kaolinite edge surfaces

34. Using Triple Modular Redundancy for Threshold Determination in DDOS Intrusion Detection Systems

35. Detecting and Mitigating Low-Rate DoS and DDoS Attacks: Multimodal Fusion of Time- Frequency Analysis and Deep Learning model

36. Realtime Feature Engineering for Anomaly Detection in IoT Based MQTT Networks

37. Real-Time Network Packet Classification Exploiting Computer Vision Architectures

38. A brief investigation of the dose field virtual simulation tools for reactor decommissioning and preliminary design for the HWRR reactor in China

39. D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange

42. Systematic Analysis of Risks in Industry 5.0 Architecture.

43. Quantum Capacitance of Mo2N MXene for Supercapacitor Applications.

44. Bridging two worlds: (DABCO-H)CuKI3 a hybrid copper iodide phosphor with a perovskite structure.

45. Mitigation Services on SDN for Distributed Denial of Service and Denial of Service Attacks Using Machine Learning Techniques.

46. A‐Site Cation Replacement of Hydrazinium Lead Iodide Perovskites by Borane Ammonium Ions: A DFT Calculation.

47. Electronic and Magnetic Properties of the Solid Solution Cr: ZnSeTe with the Cationic Vacancy.

48. First Principle Study of Structural, Electronic, Optical Properties of Co-Doped ZnO.

49. Charge transfer and physisorption mechanism between tosylate, pyrimidine and the surfaces of nanocopper (Cu9) and (Cu10) utilizing algorithms of (DFT).

50. Overcoming Network Security on Host-Based Intrusion Detection System (HIDS) With IP and PORT Blocking Methods

Catalog

Books, media, physical & digital resources