Academic literature on the topic 'Ddos'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ddos.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Ddos"
Abdelhaq, Maha, Raed Alsaqour, Mada Alaskar, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textMaha, Abdelhaq, Alsaqour Raed, Alaskar Mada, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844–52. https://doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textHunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGARCH Computer Architecture News 41, no. 1 (2013): 499–508. http://dx.doi.org/10.1145/2490301.2451170.
Full textHunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGPLAN Notices 48, no. 4 (2013): 499–508. http://dx.doi.org/10.1145/2499368.2451170.
Full textJing, Hengchang, and Jian Wang. "Detection of DDoS Attack within Industrial IoT Devices Based on Clustering and Graph Structure Features." Security and Communication Networks 2022 (March 7, 2022): 1–9. http://dx.doi.org/10.1155/2022/1401683.
Full textAcharya, Saket, and Nitesh Pradhan. "DDoS Simulation and Hybrid DDoS Defense Mechanism." International Journal of Computer Applications 163, no. 9 (2017): 20–24. http://dx.doi.org/10.5120/ijca2017913736.
Full textAbdullayeva, Fargana J. "Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.305242.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Full textDissertations / Theses on the topic "Ddos"
Sönnerfors, Peter, Elliot Nilsson, and Michael Gustafsson. "DDoS-skydd för hemanvändare : En studie kring DDoS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34952.
Full textAndersson, Emil. "DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.
Full textNagy, Peter. "Automatická mitigace DDoS útoku." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-386011.
Full textArikan, Erinc. "Attack profiling for DDoS benchmarks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file Mb., 96 p, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1435821.
Full textHurta, Marek. "Odvozování pravidel pro mitigaci DDoS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363809.
Full textFlandrin, Flavien. "Rate based IPS for DDoS." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4007.
Full textSikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.
Full textKommareddy, Christopher. "Detecting DDoS attacks in stub domains." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3324.
Full textNilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.
Full textHansen, Richard E. M. Eng Massachusetts Institute of Technology. "Stateful anycast for distributed DDoS mitigation." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41539.
Full textBooks on the topic "Ddos"
1946-, Jenkins Geraint H., ed. Cymru, ddoe a heddiw. Gwasg Prifysgol Rhydychen, 1992.
Find full textBook chapters on the topic "Ddos"
Schmidt, D., and S. M. Shalinie. "DDoS Testbed." In An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6_4.
Full textWisthoff, Michael. "DDoS Countermeasures." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54978-1_117.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Lab." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-14.
Full textPatil, Nilesh Vishwasrao, C. Rama Krishna, and Krishan Kumar. "SS-DDoS:." In Security and Resilience of Cyber Physical Systems. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003185543-7.
Full textYu, Shui. "DDoS Attack Detection." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_3.
Full textBrooks, Richard R., and İlker Özçelik. "What is DDoS?" In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-2.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Research: Traffic." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-5.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Research: Testing." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-6.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Research: Evaluation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-7.
Full textBrooks, Richard R., and İlker Özçelik. "Deceiving DDoS Detection." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-9.
Full textConference papers on the topic "Ddos"
Chi, Kaiwen, Xiaohui Xie, Yannan Hu, et al. "E-DDoS: An Evaluation System for DDoS Attack Detection." In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 2024. https://doi.org/10.1109/icnp61940.2024.10858578.
Full textHunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." In the eighteenth international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2451116.2451170.
Full textWang, Zhongqing, and Yue Zhang. "DDoS Event Forecasting using Twitter Data." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/580.
Full textSoon Hin Khor and Akihiro Nakao. "Overfort: Combating DDoS with peer-to-peer DDoS puzzle." In Distributed Processing Symposium (IPDPS). IEEE, 2008. http://dx.doi.org/10.1109/ipdps.2008.4536561.
Full textLi, Xiangfeiyang, and Jonathan Thamrun. "An Intelligent DDoS Detection System to recognize and Prevent DDoS Attacks using Artificial Intelligence and Machine Learning." In 5th International Conference on Artificial Intelligence and Big Data. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140412.
Full textMoura, Giovane C. M., Ricardo de O. Schmidt, John Heidemann, et al. "Anycast vs. DDoS." In IMC 2016: Internet Measurement Conference. ACM, 2016. http://dx.doi.org/10.1145/2987443.2987446.
Full textKumar, Rahul, Rahul Karanam, Rahul Chowdary Bobba, and Raghunath S. "DDoS Defense Mechanism." In 2009 International Conference on Future Networks, ICFN. IEEE, 2009. http://dx.doi.org/10.1109/icfn.2009.37.
Full textCardigliano, Alfredo, Luca Deri, and Tord Lundstrom. "Commoditising DDoS mitigation." In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2016. http://dx.doi.org/10.1109/iwcmc.2016.7577112.
Full text"THROTTLING DDoS ATTACKS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002229001210126.
Full textNeves, Bruno, Filipe Leite, Lucas Jorge, Rahyan Paiva, Juliana Bezerra, and Vitor Curtis. "Exploring DDoS Mechanisms." In 14th International Conference on Software Technologies. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007835304600467.
Full textReports on the topic "Ddos"
Mortensen, A., T. Reddy, and R. Moskowitz. DDoS Open Threat Signaling (DOTS) Requirements. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8612.
Full textAndreasen, F., N. Teague, and R. Compton. DDoS Open Threat Signaling (DOTS) Architecture. Edited by A. Mortensen and T. Reddy.K. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8811.
Full textPark, Kihong. Scalable Protection Against DDOS and Worm Attacks. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada423164.
Full textBoucadair, M., and T. Reddy.K. DDoS Open Threat Signaling (DOTS) Agent Discovery. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8973.
Full textDobbins, R., D. Migault, R. Moskowitz, N. Teague, L. Xia, and K. Nishizuka. Use Cases for DDoS Open Threat Signaling. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8903.
Full textMirkovic, Jelena. Benchmarks for Evaluation of Distributed Denial of Service (DDOS). Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada477282.
Full textBoucadair, M., T. Reddy.K, and W. Pan. Multihoming Deployment Considerations for DDoS Open Threat Signaling (DOTS). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9284.
Full textHayashi, Y., M. Chen, and L. Su. Use Cases for DDoS Open Threat Signaling (DOTS) Telemetry. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9387.
Full textBlackert, W. J., R. L. Hom, A. K. Castner, R. M. Jokerst, and D. M. Gregg. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA). Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429339.
Full textAllende López, Marcos, and Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Edited by Alejandro Pardo and Mariana Gutierrez. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004243.
Full text