Journal articles on the topic 'Attack mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bentley, Mark, Alec Stephenson, Peter Toscas, and Zili Zhu. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk." Risks 8, no. 2 (2020): 61. http://dx.doi.org/10.3390/risks8020061.
Full textSamer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.
Full textKadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.
Full textDhadhal, Hema, and Dr Paresh Kotak. "Analytical study of effects of DDoS mitigation methods." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 5 (2023): 728–31. http://dx.doi.org/10.54660/.ijmrge.2023.4.5.728-731.
Full textDhadhal, Hema, and Paresh Kotak. "Leveraging datasets for effective mitigation of DDoS attacks in software-defined networking: significance and challenges." Radioelectronic and Computer Systems 2024, no. 2 (2024): 136–46. http://dx.doi.org/10.32620/reks.2024.2.11.
Full textVenkatachalam, Nallarasan, and Kottilingam Kottursamy. "Jamming Attack Mitigation in CR-IoT Using Game Theory." Revue d'Intelligence Artificielle 36, no. 4 (2022): 615–20. http://dx.doi.org/10.18280/ria.360414.
Full textGupta, Deepak, Ankita Sharma, Rashmi Pandey, Deshdeepak Shrivastava, Archana Acharya, and Madhukar Dubey. "ENHANCING COLLABORATIVE MITIGATION OF VOLUMETRIC DDOS ATTACKS AND FAILURE IN MULTI-SDN NETWORKS." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3165–72. http://dx.doi.org/10.21917/ijct.2024.0471.
Full textShankari, M. Uma, and Dr S. Rethinavalli. "Dynamic Duplication Attack Detection and Mitigation System (DDADMS)." Indian Journal Of Science And Technology 18, no. 18 (2025): 1452–64. https://doi.org/10.17485/ijst/v18i18.535.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Full textKang, Liuwang, and Haiying Shen. "Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems." ACM Transactions on Cyber-Physical Systems 6, no. 1 (2022): 1–24. http://dx.doi.org/10.1145/3495534.
Full textVallabhaneni, Rohith, Sanjaikanth E. Vadakkethil Somanathan Pillai, Srinivas A. Vaddadi, Santosh Reddy Addula, and Bhuvanesh Ananthan. "Optimized deep neural network based vulnerability detection enabled secured testing for cloud SaaS." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1950. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1950-1959.
Full textRohith, Vallabhaneni Sanjaikanth E. Vadakkethil Somanathan Pillai Srinivas A. Vaddadi Santosh Reddy Addula Bhuvanesh Ananthan. "Optimized deep neural network based vulnerability detection enabled secured testing for cloud SaaS." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1950–59. https://doi.org/10.11591/ijeecs.v36.i3.pp1950-1959.
Full textAlmerri Mubarak H M M J, Et al. "Security Mechanisms of Distributed Denial-Of-Service (DDOS) Attack in Everything-as-a-Service (XaaS) - Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 438–44. http://dx.doi.org/10.17762/ijritcc.v11i9.8825.
Full textAlfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Full textAmaresan, Venkatesan. "Securing Software-Defined Networks Through Dos Attack Type Classification And Mitigation Framework Using Lrs2btm." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–14. https://doi.org/10.5281/zenodo.14005251.
Full textAngelakis, Dimitris, Errikos Ventouras, Spyros Kostopoulos, and Pantelis Asvestas. "Cybersecurity Issues in Brain-Computer Interfaces: Analysis of Existing Bluetooth Vulnerabilities." Digital Technologies Research and Applications 3, no. 2 (2024): 115–39. http://dx.doi.org/10.54963/dtra.v3i2.286.
Full textKumar, Aman. "Distributed Denial of Service (DDoS) Attack Mitigation using AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5706–14. https://doi.org/10.22214/ijraset.2025.69632.
Full textBeg, Omar, Asad Khan, Waqas Rehman, and Ali Hassan. "A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids." Energies 16, no. 22 (2023): 7644. http://dx.doi.org/10.3390/en16227644.
Full textPrajwal B, Asha Kumari A, Saravana Kumar E, and Mohit S. "Understanding Botnets: Architecture, Attacks, and Mitigation Strategies." South Asian Journal of Engineering and Technology 15, no. 1 (2025): 1–16. https://doi.org/10.26524/sajet.2025.15.1.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment." Scalable Computing: Practice and Experience 20, no. 4 (2019): 669–85. http://dx.doi.org/10.12694/scpe.v20i4.1569.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.
Full textTas, Ismail Melih, and Selcuk Baktir. "A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack." Applied Sciences 13, no. 3 (2023): 1864. http://dx.doi.org/10.3390/app13031864.
Full textAsia Ayaz Andrabi, Syed, Sachi Pandey, and Akthar Nazir. "A review on mitigation of the DDoS Attack in cloud in regulated environment." International Journal of Engineering & Technology 7, no. 2.8 (2018): 497. http://dx.doi.org/10.14419/ijet.v7i2.8.10492.
Full textR, Murugesan*1 Dr M. Vijayaraj2 &. Dr. K. Vetrivel. "MULTI ATTRIBUTE MINIMUM THROTTLE APPROXIMATION BASED SINKHOLE DETECTION IN MOBILE ADHOC NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 455–63. https://doi.org/10.5281/zenodo.814697.
Full textKumar, Adithyan Arun, Gowthamaraj Rajendran, Nitin Srinivasan, Praveen Kumar Sridhar, and Kishore Kumar Perumalsamy. "Survey of Attacks against HTTPS: Analysis, Exploitation, and Mitigation Strategies." International Journal of Innovative Technology and Exploring Engineering 13, no. 4 (2024): 28–34. http://dx.doi.org/10.35940/ijitee.d9826.13040324.
Full textAdithyan, Arun Kumar. "Survey of Attacks Against HTTPS: Analysis, Exploitation, and Mitigation Strategies." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 13, no. 4 (2024): 28–34. https://doi.org/10.35940/ijitee.D9826.13040324.
Full textKela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.
Full textSubramaniam.T.K and Deepa.B. "SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS." SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS 7, no. 1 (2022): 11. https://doi.org/10.5281/zenodo.6700029.
Full textMinh, Huong Nguyen, Tran Hoang Tung, Huynh Vinh Nam, and Pham Thanh Giang. "A Defense System: Jamming Detection and Mitigation for Safety Applications in Vehicular Networks." International Journal of Emerging Technology and Advanced Engineering 13, no. 2 (2023): 33–39. http://dx.doi.org/10.46338/ijetae0223_05.
Full textXu, Lezhong, Yupeng Zhu, Zhuoyu Li, and Quanqi Zhang. "Safety Control for Cyber–Physical Systems Under False Data Injection Attacks." Electronics 14, no. 6 (2025): 1103. https://doi.org/10.3390/electronics14061103.
Full textKadam, Asmita. "SDN-Driven Security Framework for DDOS Attack Detection and Mitigation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 620–25. http://dx.doi.org/10.22214/ijraset.2024.65142.
Full textAbdul, Khadar A., Shrishail Math Dr., Brahmananda S. H. Dr., and Shivamurthy G. Dr. "Website Vulnerability Detection: Inception of Mitigation of Advanced Persistent Threats." Solid State Technology 63, no. 6 (2020): 7902. https://doi.org/10.5281/zenodo.7549581.
Full textMoein, Samer, T. Aaron Gulliver, Fayez Gebali, and Abdulrahman Alkandari. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security 7, no. 1 (2017): 9–28. http://dx.doi.org/10.5121/ijcis.2017.7102.
Full textMukhtar, Husameldin, Khaled Salah, and Youssef Iraqi. "Mitigation of DHCP starvation attack." Computers & Electrical Engineering 38, no. 5 (2012): 1115–28. http://dx.doi.org/10.1016/j.compeleceng.2012.06.005.
Full textDhanaraj, Rajesh Kumar, Rutvij H. Jhaveri, Lalitha Krishnasamy, Gautam Srivastava, and Praveen Kumar Reddy Maddikunta. "Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, Supp02 (2021): 297–315. http://dx.doi.org/10.1142/s021848852140016x.
Full textKumar, R. Dhileep. "ML Based Detection & Classification of High- and Low-Rate DDoS Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41808.
Full textHarmeet Singh, Er, and Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN." International Journal of Engineering & Technology 7, no. 4.7 (2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.
Full textT. Ramya. "Review on DDOS Attacks in IOT Networks." Power System Technology 48, no. 4 (2024): 2400–2428. https://doi.org/10.52783/pst.1137.
Full textZhang, Zhewen, Yao Liu, Yuhan She, Abdurrashid Ibrahim Sanka, Patrick S. Y. Hung, and Ray C. C. Cheung. "ConBOOM: A Configurable CPU Microarchitecture for Speculative Covert Channel Mitigation." Electronics 14, no. 5 (2025): 850. https://doi.org/10.3390/electronics14050850.
Full textde Caldas Filho, Francisco Lopes, Samuel Carlos Meneses Soares, Elder Oroski, et al. "Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning." Sensors 23, no. 14 (2023): 6305. http://dx.doi.org/10.3390/s23146305.
Full textM., Uma Shankari, and S. Rethinavalli Dr. "Dynamic Duplication Attack Detection and Mitigation System (DDADMS)." Indian Journal of Science and Technology 18, no. 18 (2025): 1452–64. https://doi.org/10.17485/IJST/v18i18.535.
Full textSangeetha, Prabhu, and P. S. Nethravathi. "A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model." International Journal of Applied Engineering and Management Letters (IJAEML) 6, no. 1 (2022): 149–59. https://doi.org/10.5281/zenodo.6349848.
Full textWani, Sharyar, Mohammed Imthiyas, Hamad Almohamedh, Khalid M. Alhamed, Sultan Almotairi, and Yonis Gulzar. "Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight." Symmetry 13, no. 2 (2021): 227. http://dx.doi.org/10.3390/sym13020227.
Full textEl-Zoghby, Ayman M., Mahmoud Said ElSayed, Anca Jurcut, and Marianne A. Azer. "Overview of the Code-Reuse Attacks Mitigations, and Evaluation using SMAA-2 Approach." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 108–48. https://doi.org/10.54364/cybersecurityjournal.2025.1106.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textRajesh, Kumar* Dr. Raman Chadha. "MITIGATION OF BLACK HOLE ATTACK USING GENERIC ALGORITHMS AND FUZZY LOGIC." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 6 (2016): 818–26. https://doi.org/10.5281/zenodo.56021.
Full textLi, Jishuai, Sujuan Qin, Tengfei Tu, Hua Zhang, and Yongsheng Li. "Packet Injection Exploiting Attack and Mitigation in Software-Defined Networks." Applied Sciences 12, no. 3 (2022): 1103. http://dx.doi.org/10.3390/app12031103.
Full textZaen, Mohammad Taufan Asri, Ahmad Tantoni, and Maulana Ashari. "DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS." JISA(Jurnal Informatika dan Sains) 4, no. 2 (2021): 149–54. http://dx.doi.org/10.31326/jisa.v4i2.1043.
Full text