Contents
Academic literature on the topic 'Amplification attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Amplification attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Amplification attack"
Anagnostopoulos, Marios, Georgios Kambourakis, Panagiotis Kopanos, Georgios Louloudakis, and Stefanos Gritzalis. "DNS amplification attack revisited." Computers & Security 39 (November 2013): 475–85. http://dx.doi.org/10.1016/j.cose.2013.10.001.
Full textQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, et al. "An efficient algorithm to detect DDoS amplification attacks." Journal of Intelligent & Fuzzy Systems 39, no. 6 (2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Full textSieklik, Boris, Richard Macfarlane, and William J. Buchanan. "Evaluation of TFTP DDoS amplification attack." Computers & Security 57 (March 2016): 67–92. http://dx.doi.org/10.1016/j.cose.2015.09.006.
Full textWidagdo, Gede Barkah. "Real-Time Early Detection NTP Amplification Attack." ACMIT Proceedings 3, no. 1 (2019): 76–84. http://dx.doi.org/10.33555/acmit.v3i1.29.
Full textNajafabadi, Maryam M., Taghi M. Khoshgoftaar, and Amri Napolitano. "Detecting Network Attacks Based on Behavioral Commonalities." International Journal of Reliability, Quality and Safety Engineering 23, no. 01 (2016): 1650005. http://dx.doi.org/10.1142/s0218539316500054.
Full textKhan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks." International Journal of Cognitive Informatics and Natural Intelligence 8, no. 3 (2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Full textChen, Hsien-Pu, Muneer Mohammad, and Laszlo B. Kish. "Current Injection Attack against the KLJN Secure Key Exchange." Metrology and Measurement Systems 23, no. 2 (2016): 173–81. http://dx.doi.org/10.1515/mms-2016-0025.
Full textAlfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Full textMalekzadeh, Mina, Moghis Ashrostaghi, and M. H. Shahrokh Abadi. "Amplification-based Attack Models for Discontinuance of Conventional Network Transmissions." International Journal of Information Engineering and Electronic Business 7, no. 6 (2015): 15–22. http://dx.doi.org/10.5815/ijieeb.2015.06.03.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full text