Journal articles on the topic 'Availability Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Availability Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Houmer, Meriem, and Moulay Lahcen Hasnaoui. "A risk and security assessment of VANET availability using attack tree concept." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6039. http://dx.doi.org/10.11591/ijece.v10i6.pp6039-6044.
Full textAhmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textD, Sheethal, and Chandrashekhar H.K. "A Novel Mechanism for Detecting DOS Attack in VANET Using EAPDA." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 286. http://dx.doi.org/10.23956/ijermt.v6i7.227.
Full textAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (October 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Full textThaper, Rohit, and Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing." Journal of Cases on Information Technology 17, no. 3 (July 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Full textKlymash, M. M., O. M. Shpur, and N. V. Pelekh. "WEB SERVICE AVAILABILITY MONITORING IN DISTRIBUTED INFOCOMMUNICATION SYSTEMS." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 137–50. http://dx.doi.org/10.36994/2707-4110-2020-1-28-12.
Full textDemarquay, G., A. Lothe, JP Royet, N. Costes, G. Mick, F. Mauguière, and P. Ryvlin. "Brainstem changes in 5-HT1A receptor availability during migraine attack." Cephalalgia 31, no. 1 (October 29, 2010): 84–94. http://dx.doi.org/10.1177/0333102410385581.
Full textTavana, Madjid, Dawn A. Trevisani, and Dennis T. Kennedy. "A Fuzzy Cyber-Risk Analysis Model for Assessing Attacks on the Availability and Integrity of the Military Command and Control Systems." International Journal of Business Analytics 1, no. 3 (July 2014): 21–36. http://dx.doi.org/10.4018/ijban.2014070102.
Full textNaha, Bibek, Siddhartha Banerjee, and Sayanti Mondal. "A SURVEY ON CLOUD-DENIAL OF SERVICE." American Journal of Advanced Computing 1, no. 2 (April 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1205.
Full textSaravanan, A., S. SathyaBama, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "A new framework to alleviate DDoS vulnerabilities in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4163. http://dx.doi.org/10.11591/ijece.v9i5.pp4163-4175.
Full textChaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (February 5, 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (March 30, 2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textSharifi, Aboosaleh Mohammad. "Availability challenge of cloud system under DDOS attack." Indian Journal of Science and Technology 5, no. 6 (June 20, 2012): 1–5. http://dx.doi.org/10.17485/ijst/2012/v5i6.21.
Full textUpadhya, K. Sadananda, and N. K. Srinivasan. "Availability of Weapon Systems with Air-attack Missions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 1, no. 2 (April 2004): 111–21. http://dx.doi.org/10.1177/875647930400100205.
Full textKaspi, Roy, Boaz Yuval, and Michael P. Parrella. "Anticipated host availability increases parasitoid host attack behaviour." Animal Behaviour 82, no. 5 (November 2011): 1159–65. http://dx.doi.org/10.1016/j.anbehav.2011.08.014.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (August 1, 2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textDjanie, Tutu, and Dzisi. "A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques." Computers 8, no. 4 (November 26, 2019): 85. http://dx.doi.org/10.3390/computers8040085.
Full textKumar, Manish, and Abhinav Bhandari. "Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 29–46. http://dx.doi.org/10.4018/ijisp.2017100103.
Full textGuo, Wei, Sujuan Qin, Jun Lu, Fei Gao, Zhengping Jin, and Qiaoyan Wen. "Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage." Computer Journal 63, no. 8 (January 2, 2020): 1216–30. http://dx.doi.org/10.1093/comjnl/bxz151.
Full textRocha, Augusto Cezar Rodrigues, Gustavo Ferreira Pedrosa, Auro Barreiros Freire, Gibson Moreira Praça, Herbert Ugrinowitsch, Henrique de Oliveira Castro, and Gustavo Teixeira Costa. "Analysis of the setting and predictive factors of the effect of attack according to game ecology." Kinesiology 52, no. 2 (2020): 217–23. http://dx.doi.org/10.26582/k.52.2.7.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment." Scalable Computing: Practice and Experience 20, no. 4 (December 4, 2019): 669–85. http://dx.doi.org/10.12694/scpe.v20i4.1569.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP Distributed Denial of Service Attack Detection in Cloud." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): 285–98. http://dx.doi.org/10.12694/scpe.v20i2.1501.
Full textSilveira, Matheus Ferraz, and André L. S. Gradvohl. "Security analysis of the message queuing telemetry transport protocol." Revista Brasileira de Computação Aplicada 13, no. 2 (July 7, 2021): 83–95. http://dx.doi.org/10.5335/rbca.v13i2.12163.
Full textSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Full textPETRICĂ, Gabriel, and Ioan-Cosmin MIHAI. "Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees." International Journal of Information Security and Cybercrime 9, no. 1 (June 22, 2020): 37–42. http://dx.doi.org/10.19107/ijisc.2020.01.05.
Full textMondragón, Oscar, Andrés Felipe Mera Arcos, Christian Urcuqui, and Andrés Navarro Cadavid. "Security control for website defacement." Sistemas y Telemática 15, no. 41 (August 1, 2017): 45–55. http://dx.doi.org/10.18046/syt.v15i41.2442.
Full textJeyanthi, N., and P. C. Mogankumar. "A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks." Cybernetics and Information Technologies 14, no. 3 (September 1, 2014): 71–85. http://dx.doi.org/10.2478/cait-2014-0034.
Full textRamírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.
Full textLoadman, N. L., G. E. E. Moodie, and J. A. Mathias. "Significance of Cannibalism in Larval Walleye (Stizostedion vitreum)." Canadian Journal of Fisheries and Aquatic Sciences 43, no. 3 (March 1, 1986): 613–18. http://dx.doi.org/10.1139/f86-073.
Full textWan, Runze, Lixin Ding, Naixue Xiong, and Xing Zhou. "Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987064. http://dx.doi.org/10.1177/1550147719870645.
Full textRocha, Augusto Cézar Rodrigues, Lorenzo Laporta, Henrique Modenesi, Rodrigo Luiz Vancini, Fabiano de Souza Fonseca, Gilmário Ricarte Batista, Alexandre Igor Araripe Medeiros, et al. "Setting distribution analysis in elite-level men's volleyball: an ecological approach." Research, Society and Development 10, no. 1 (January 25, 2021): e47710111994. http://dx.doi.org/10.33448/rsd-v10i1.11994.
Full textHasan, Mainul, Amogh Venkatanarayan, Inder Mohan, Ninni Singh, and Gunjan Chhabra. "Comparison of Various DoS Algorithm." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 27–43. http://dx.doi.org/10.4018/ijisp.2020010103.
Full textBustami, Agustani, and Syamsul Bahri. "Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi : Systematic Review." UNISTEK 7, no. 2 (August 25, 2020): 59–70. http://dx.doi.org/10.33592/unistek.v7i2.645.
Full textjain, Rupal, and Rajneesh Pachouri. "DETECTING AND ISOLATING BLACK-HOLE ATTACKS IN MANET USING COUNTER BASED TROLLING TECHNIQUE." International Journal of Advanced Research in Computer Science 11, no. 6 (December 20, 2020): 36–45. http://dx.doi.org/10.26483/ijarcs.v11i6.6679.
Full textAn, Hyok, Yoonjong Na, Heejo Lee, and Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures." Electronics 10, no. 11 (May 24, 2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Full textZhao, Xiaolin, Hui Peng, Xiang Li, Yue Li, Jingfeng Xue, Yaoyuan Liang, and Mingzhe Pei. "Defending Application Layer DDoS Attacks via Multidimensional Parallelotope." Security and Communication Networks 2020 (December 30, 2020): 1–11. http://dx.doi.org/10.1155/2020/6679304.
Full textPandey, Ravi Shankar, Vivek Srivastava, and Lal Babu Yadav. "Research trends and solutions for secure traffic management of SDN." APTIKOM Journal on Computer Science and Information Technologies 2, no. 3 (January 22, 2020): 97–105. http://dx.doi.org/10.34306/csit.v2i3.70.
Full textDhanapal A and Nithyanandam P. "The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud." International Journal of Information System Modeling and Design 10, no. 3 (July 2019): 41–58. http://dx.doi.org/10.4018/ijismd.2019070103.
Full textShi, Qiong, Li Qin, Lipeng Song, Rongping Zhang, and Yanfeng Jia. "A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks." Discrete Dynamics in Nature and Society 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5743801.
Full textMuraleedharan N. and Janet B. "SCAFFY." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 106–28. http://dx.doi.org/10.4018/ijisp.2021070107.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textLuh, Robert, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, and Helge Janicke. "PenQuest: a gamified attacker/defender meta model for cyber security assessment and education." Journal of Computer Virology and Hacking Techniques 16, no. 1 (November 22, 2019): 19–61. http://dx.doi.org/10.1007/s11416-019-00342-x.
Full textShankar Pandey, Ravi, Vivek Srivastava, and Lal Babu Yadav. "Research trends and solutions for secure traffic management of SDN." APTIKOM Journal on Computer Science and Information Technologies 2, no. 3 (November 1, 2017): 97–105. http://dx.doi.org/10.11591/aptikom.j.csit.68.
Full textArlis, Syafri, and Sahari. "Analisis Firewall Demilitarized Zone dan Switch Port Security pada Jaringan Universitas Putra Indonesia YPTK." Jurnal KomtekInfo 6, no. 1 (June 1, 2019): 29. http://dx.doi.org/10.35134/komtekinfo.v6i1.39.
Full textBabu, M. Rajesh, S. Moses Dian, Siva Chelladurai, and Mathiyalagan Palaniappan. "Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/715820.
Full textNassef, Laila, and Reemah Alhebshi. "Fuzzy-based reliable and secure cooperative spectrum sensing for the smart grid." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 2 (February 2021): 92–100. http://dx.doi.org/10.21833/ijaas.2021.02.013.
Full textGhanbari, Maryam, and Witold Kinsner. "Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning." International Journal of Cognitive Informatics and Natural Intelligence 14, no. 1 (January 2020): 17–34. http://dx.doi.org/10.4018/ijcini.2020010102.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (June 29, 2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textEt. al., K. NandhaKumar,. "A Hybrid Adaptive Development Algorithm and Machine Learning Based Method for Intrusion Detection and Prevention System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1226–36. http://dx.doi.org/10.17762/turcomat.v12i5.1789.
Full text