Academic literature on the topic 'Availability Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Availability Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Availability Attack"
Houmer, Meriem, and Moulay Lahcen Hasnaoui. "A risk and security assessment of VANET availability using attack tree concept." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6039. http://dx.doi.org/10.11591/ijece.v10i6.pp6039-6044.
Full textAhmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textD, Sheethal, and Chandrashekhar H.K. "A Novel Mechanism for Detecting DOS Attack in VANET Using EAPDA." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 286. http://dx.doi.org/10.23956/ijermt.v6i7.227.
Full textAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (October 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Full textThaper, Rohit, and Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing." Journal of Cases on Information Technology 17, no. 3 (July 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Full textKlymash, M. M., O. M. Shpur, and N. V. Pelekh. "WEB SERVICE AVAILABILITY MONITORING IN DISTRIBUTED INFOCOMMUNICATION SYSTEMS." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 137–50. http://dx.doi.org/10.36994/2707-4110-2020-1-28-12.
Full textDemarquay, G., A. Lothe, JP Royet, N. Costes, G. Mick, F. Mauguière, and P. Ryvlin. "Brainstem changes in 5-HT1A receptor availability during migraine attack." Cephalalgia 31, no. 1 (October 29, 2010): 84–94. http://dx.doi.org/10.1177/0333102410385581.
Full textTavana, Madjid, Dawn A. Trevisani, and Dennis T. Kennedy. "A Fuzzy Cyber-Risk Analysis Model for Assessing Attacks on the Availability and Integrity of the Military Command and Control Systems." International Journal of Business Analytics 1, no. 3 (July 2014): 21–36. http://dx.doi.org/10.4018/ijban.2014070102.
Full textNaha, Bibek, Siddhartha Banerjee, and Sayanti Mondal. "A SURVEY ON CLOUD-DENIAL OF SERVICE." American Journal of Advanced Computing 1, no. 2 (April 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1205.
Full textSaravanan, A., S. SathyaBama, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "A new framework to alleviate DDoS vulnerabilities in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4163. http://dx.doi.org/10.11591/ijece.v9i5.pp4163-4175.
Full textDissertations / Theses on the topic "Availability Attack"
Rozo, Osuna Maria Jose. "Mass Shootings and Gun Sales: A Study on the Influence of Red and Blue Power." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7914.
Full textde, Souza Jaqueline. "Comparison of Liberty Alliance and OpenID regarding their ability to protect the confidentiality, integrity and availability of the users’ information : a study based on the analysis of resistance to common attacks." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4424.
Full text"A Model for Calculating Damage Potential in Computer Systems." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53889.
Full textDissertation/Thesis
Masters Thesis Computer Science 2019
Chang, Lian, and 張利安. "Practical Attacks against LTE Availability with Low-cost Software-defined Radio." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/df674r.
Full text國立臺灣科技大學
資訊工程系
105
As a significant 4G communication technology in modern society, Long Term Evolution (LTE) provides better coverage, spectral efficiency, system capacity, lower latency, higher data rates, and enhanced security, comparing with previous generations, Global System for Mobile Communications and Universal Mobile Telecommunications System. The mutual authentication feature of LTE with cyphering communications basically prevent user equipment (UE) from being attacked by a rogue base station (BS), such as sniffing and spoofing. However, with a rogue BS, a malicious attacker could still leverage unencrypted and essential signaling messages to launch a Denial of Service (DoS) attack to a target UE. By examining all unencrypted signalings initialized before a mutual authentication procedure, this paper proposes a novel availability attack by exploiting reject messages for attach and tracking area update procedures. In particular, the victim UE will be enforced to disconnect with all BSs in the tracking area specified by the rogue BS. Please note that during our attack, the victim UE still searches for another allowed tracking area for connection, which makes our attack more unawareness comparing with existing availability attacks. We practically implement the attack by using open source project, OpenAirInterface (OAI) and low-cost software defined radio, Universal Software Radio Peripheral (USRP). From the observations of experimental results, we offer some suggestions to make such DoS attack more effective.
Books on the topic "Availability Attack"
New York (State). Legislature. Assembly. Standing Committee on Insurance. Public hearing on insurance availability and affordability in the wake of September 11 and the impact on the region's recovery. [Mineola]: EN-DE Reporting, 2002.
Find full textGOVERNMENT, US. An Act to Extend the Period of Availability of Unemployment Assistance under the Robert T. Stafford Disaster Relief and Emergency Assistance Act in the Case of Victims of the Terrorist Attacks of September 11, 2001. [Washington, D.C: U.S. G.P.O., 2002.
Find full textGeetha, S. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019.
Find full textLloyd, Ian J. 10. Substantive criminal law provisions. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.003.0010.
Full textKusumawardhani, Niken, Rezanti Pramana, Nurmala Saputri, and Daniel Suryadarma. Heterogeneous impact of internet availability on female labour market outcomes in an emerging economy: Evidence from Indonesia. 49th ed. UNU-WIDER, 2021. http://dx.doi.org/10.35188/unu-wider/2021/987-7.
Full textDavid, Deirdre. Besieged. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198729617.003.0009.
Full textGreve, Carsten, and Graeme A. Hodge. Private Finance. Edited by Bent Flyvbjerg. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198732242.013.16.
Full textNielsen-Saines, Karin. Antiretroviral Therapy in Children and Newborns. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190493097.003.0027.
Full text1953-, Bascetta Cynthia A., and United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security and Foreign Affairs, eds. September 11: HHS needs to ensure the availability of health screening and monitoring for all responders : report to Congressional Requestors. Washington, D.C: U.S. Government Accountability Office, 2007.
Find full textChałubińska-Jentkiewicz, Katarzyna, Mirosław Karpiuk, and Jarosław Kostrubiec. The Legal Status of Public Entities in the Field of Cybersecurity in Poland. Institute for Local Self-Government Maribor, 2021. http://dx.doi.org/10.4335/2021.5.
Full textBook chapters on the topic "Availability Attack"
Pérez-Solà, Cristina, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joaquin Garcia-Alfaro. "LockDown: Balance Availability Attack Against Lightning Network Channels." In Financial Cryptography and Data Security, 245–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_14.
Full textXiong, Cheng-Jie, Yan-Fu Li, Min Xie, Szu-Hui Ng, and Thong-Ngee Goh. "Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack." In Advances in Software Engineering, 313–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10619-4_38.
Full textMin, Byoung Joon, Seung Hwan Yoo, Jong Ho Ryu, and Dong Il Seo. "Return on Security Investment Against Cyber Attacks on Availability." In Computational Science and Its Applications - ICCSA 2006, 270–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751588_29.
Full textYu, Mingchao, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, and Pramod Viswanath. "Coded Merkle Tree: Solving Data Availability Attacks in Blockchains." In Financial Cryptography and Data Security, 114–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_8.
Full textEckhardt, Jonas, Tobias Mühlbauer, Musab AlTurki, José Meseguer, and Martin Wirsing. "Stable Availability under Denial of Service Attacks through Formal Patterns." In Fundamental Approaches to Software Engineering, 78–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28872-2_6.
Full textKharchenko, Vyacheslav, Alaa Mohammed Abdul-Hadi, Artem Boyarchuk, and Yurij Ponochovny. "Web Systems Availability Assessment Considering Attacks on Service Configuration Vulnerabilities." In Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland, 275–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07013-1_26.
Full textSumra, Irshad Ahmed, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan. "Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey." In Advances in Intelligent Systems and Computing, 51–61. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-158-9_5.
Full textKharchenko, Vyacheslav, Yuriy Ponochovnyi, Al-Khafaji Ahmed Waleed, Artem Boyarchuk, and Ievgen Brezhniev. "The Availability Models of Two-Zone Physical Security System Considering Cyber Attacks." In Theory and Applications of Dependable Computer Systems, 325–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48256-5_32.
Full textJung, Sung-Min, Jun-Kwon Jung, Tae-Kyung Kim, and Tai-Myoung Chung. "A Study on the Resource Management against Availability Attacks in Cloud Computing." In Lecture Notes in Electrical Engineering, 479–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41671-2_61.
Full textHewage, Kasun, and Thiemo Voigt. "Poster Abstract: An Experimental Study of Attacks on the Availability of Glossy." In Lecture Notes in Electrical Engineering, 103–7. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03071-5_13.
Full textConference papers on the topic "Availability Attack"
Mikhaylov, Konstantin, Radek Fujdiak, Ari Pouttu, Voznak Miroslav, Lukas Malina, and Petr Mlynek. "Energy Attack in LoRaWAN." In ARES '19: 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3339252.3340525.
Full textGallon, Laurent, and Jean Jacques Bascou. "Using CVSS in Attack Graphs." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.18.
Full textDeng, Xianglin, and Malcolm Shore. "Advanced Flooding Attack on a SIP Server." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.15.
Full textAllodi, Luca, and Fabio Massacci. "Attack Potential in Impact and Complexity." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3098965.
Full textIzu, Tetsuya, Masahiko Takenaka, and Takeshi Shimoyama. "Analysis on Bleichenbacher's Forgery Attack." In The Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.38.
Full text"Keynote 3: Topological Analysis of Network Attack Vulnerability." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.177.
Full textLiu, Changwei, Anoop Singhal, and Duminda Wijesekera. "Using Attack Graphs in Forensic Examinations." In 2012 Seventh International Conference on Availability, Reliability and Security (ARES). IEEE, 2012. http://dx.doi.org/10.1109/ares.2012.58.
Full textHacks, Simon, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, and Ariadni Michalitsi Psarrou. "Integrating Security Behavior into Attack Simulations." In ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3465481.3470475.
Full textDemir, Kubilay, and Neeraj Suri. "Towards DDoS Attack Resilient Wide Area Monitoring Systems." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103164.
Full textMukherjee, Preetam, and Chandan Mazumdar. "Attack Difficulty Metric for Assessment of Network Security." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3232817.
Full text