Journal articles on the topic 'Ddos'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ddos.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abdelhaq, Maha, Raed Alsaqour, Mada Alaskar, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textMaha, Abdelhaq, Alsaqour Raed, Alaskar Mada, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844–52. https://doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textHunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGARCH Computer Architecture News 41, no. 1 (2013): 499–508. http://dx.doi.org/10.1145/2490301.2451170.
Full textHunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGPLAN Notices 48, no. 4 (2013): 499–508. http://dx.doi.org/10.1145/2499368.2451170.
Full textJing, Hengchang, and Jian Wang. "Detection of DDoS Attack within Industrial IoT Devices Based on Clustering and Graph Structure Features." Security and Communication Networks 2022 (March 7, 2022): 1–9. http://dx.doi.org/10.1155/2022/1401683.
Full textAcharya, Saket, and Nitesh Pradhan. "DDoS Simulation and Hybrid DDoS Defense Mechanism." International Journal of Computer Applications 163, no. 9 (2017): 20–24. http://dx.doi.org/10.5120/ijca2017913736.
Full textAbdullayeva, Fargana J. "Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.305242.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Full textBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Full textMuhammad, Arif Wirawan, Imam Riadi, and Sunardi Sunardi. "Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 115. http://dx.doi.org/10.14421/jiska.2017.13-03.
Full textShieh, Chin-Shiuh, Thanh-Tuan Nguyen, Wan-Wei Lin, Wei Kuang Lai, Mong-Fong Horng, and Denis Miu. "Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks." Electronics 11, no. 13 (2022): 1977. http://dx.doi.org/10.3390/electronics11131977.
Full textKumar, Aman. "Distributed Denial of Service (DDoS) Attack Mitigation using AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5706–14. https://doi.org/10.22214/ijraset.2025.69632.
Full textShieh, Chin-Shiuh, Thanh-Tuan Nguyen, Wan-Wei Lin, et al. "Detection of Adversarial DDoS Attacks Using Generative Adversarial Networks with Dual Discriminators." Symmetry 14, no. 1 (2022): 66. http://dx.doi.org/10.3390/sym14010066.
Full textT. Ramya. "Review on DDOS Attacks in IOT Networks." Power System Technology 48, no. 4 (2024): 2400–2428. https://doi.org/10.52783/pst.1137.
Full textSolichin, Achmad, and Ludi Nugroho. "Deteksi Dini Gangguan Jaringan Distributed Denial Of Service (DDOS) Menggunakan Metode Shannon Entropy Pada Software Defined Network (SDN)." Jurnal Teknologi Informasi dan Ilmu Komputer 11, no. 3 (2024): 461–74. http://dx.doi.org/10.25126/jtiik.938188.
Full textFakiha, Bandr. "DETECTING DISTRIBUTED DENIAL OF SERVICES USING MACHINE LANGUAGE LEARNING TECHNIQUES." Journal of Southwest Jiaotong University 57, no. 5 (2022): 675–88. http://dx.doi.org/10.35741/issn.0258-2724.57.5.55.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms." Ingénierie des systèmes d information 26, no. 5 (2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Full textAladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, et al. "Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis." Applied Sciences 13, no. 2 (2023): 775. http://dx.doi.org/10.3390/app13020775.
Full textLestari, Wulan Sri. "DETEKSI SERANGAN DDoS MENGGUNAKAN Q-LEARNING." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 1 (2022): 648–58. http://dx.doi.org/10.35957/jatisi.v9i1.1473.
Full textRavichandran, S., and M. Umamaheswari. "Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM." Asian Journal of Computer Science and Technology 6, no. 2 (2017): 27–32. http://dx.doi.org/10.51983/ajcst-2017.6.2.1783.
Full textXu, Hao, and Hequn Xian. "SCD: A Detection System for DDoS Attacks based on SAE-CNN Networks." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 94–99. http://dx.doi.org/10.54097/fcis.v5i3.13865.
Full textPangestu, Raka Nugraha, Risma Yanti, and Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.
Full textSARAH, NAIEM, MARIE MOHAMED, E. KHEDR AYMAN, and M. IDREES AMIRA. "DISTRIBUTED DENIAL OF SERVICES ATTACKS AND THEIR PREVENTION IN CLOUD SERVICES." Journal of Theoretical and Applied Information Technology 100, no. 4 (2022): 1170–81. https://doi.org/10.5281/zenodo.6856824.
Full textAL-Adaileh, Mohammad A., Mohammed Anbar, Yung-Wey Chong, and Ahmed Al-Ani. "Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)." MATEC Web of Conferences 218 (2018): 02012. http://dx.doi.org/10.1051/matecconf/201821802012.
Full textZhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.
Full textSasikumar, Harrsheeta. "DDoS Attack Detection and Classification using Machine Learning Models with Real-Time Dataset Created." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 145–53. http://dx.doi.org/10.35940/ijrte.e5217.019521.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textNarote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "Detection of DDoS Attacks using Concepts of Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 390–94. http://dx.doi.org/10.22214/ijraset.2022.43723.
Full textChen, Hongsong, Caixia Meng, and Jingjiu Chen. "DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment." International Journal of Information Security and Privacy 15, no. 3 (2021): 1–18. http://dx.doi.org/10.4018/ijisp.2021070101.
Full textHan, Dezhi, Kun Bi, Han Liu, and Jianxin Jia. "A DDoS attack detection system based on spark framework." Computer Science and Information Systems 14, no. 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Full textPraba. J., Jeba, and R. Sridaran. "LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment." International Journal of Computer Network and Information Security 15, no. 2 (2023): 62–72. http://dx.doi.org/10.5815/ijcnis.2023.02.05.
Full textHarrsheeta, Sasikumar. "DDoS Attack Detection and Classification using Machine Learning Models with Real-Time Dataset Created." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 145–53. https://doi.org/10.35940/ijrte.E5217.019521.
Full textЯНКО, Аліна, Андрій ПРОКУДІН, Ілля ФІЛЬ та Олег КРУК. "ВИЯВЛЕННЯ АТАК ТИПУ LDDOS ЗА ДОПОМОГОЮ SDN МЕРЕЖ З ЕЛЕМЕНТАМИ МАШИННОГО НАВЧАННЯ". MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, № 4 (28 листопада 2024): 287–96. https://doi.org/10.31891/2219-9365-2024-80-36.
Full textWidagdo, Gede Barkah, and Charles Lim. "Analysis of Hybrid DDoS Defense to Mitigate DDoS Impact." Advanced Science Letters 23, no. 4 (2017): 3633–39. http://dx.doi.org/10.1166/asl.2017.9004.
Full textMirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms." ACM SIGCOMM Computer Communication Review 34, no. 2 (2004): 39–53. http://dx.doi.org/10.1145/997150.997156.
Full textOnyeabor, Uchechukwu Solomon, and Joshua Ojo Nehinbe. "An exhaustive study of DDOS attacks and DDOS datasets." International Journal of Internet Technology and Secured Transactions 10, no. 3 (2020): 268. http://dx.doi.org/10.1504/ijitst.2020.10028403.
Full textNehinbe, Joshua Ojo, and Uchechukwu Solomon Onyeabor. "An exhaustive study of DDOS attacks and DDOS datasets." International Journal of Internet Technology and Secured Transactions 10, no. 3 (2020): 268. http://dx.doi.org/10.1504/ijitst.2020.107075.
Full textMishra, Nivedita, Sharnil Pandya, Chirag Patel, et al. "Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications." Sensors 21, no. 23 (2021): 8071. http://dx.doi.org/10.3390/s21238071.
Full textSachdeva, Monika, and Krishan Kumar. "A Traffic Cluster Entropy Based Approach to Distinguish DDoS Attacks from Flash Event Using DETER Testbed." ISRN Communications and Networking 2014 (May 13, 2014): 1–15. http://dx.doi.org/10.1155/2014/259831.
Full textRudro, Rifat Al Mamun, MD FARUK ABDULLAH AL SOHAN, Syma Kamal Chaity, and Rubina Islam Reya. "Enhancing DDoS Attack Detection Using Machine Learning: A Framework with Feature Selection and Comparative Analysis of Algorithms." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, no. 03 (2023): 1185–92. http://dx.doi.org/10.61841/turcomat.v14i03.14086.
Full textReddy, N. Narasimha, and G. M. Vema Reddy. "DDoS Attack Detection in SDN using ML Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 2035–38. http://dx.doi.org/10.22214/ijraset.2023.56350.
Full textQamar, Roheen. "Deep Defense: Using Radial Basis Neural Networks for Mitigating the DDoS Attacks." Sukkur IBA Journal of Computing and Mathematical Sciences 8, no. 2 (2025): 25–36. https://doi.org/10.30537/sjcms.v8i2.1473.
Full textManish Kumar Rajak and Dr. Ravindra Tiwari. "A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 1 (2024): 175–79. http://dx.doi.org/10.29070/hc5qzn85.
Full textRajak, Manish Kumar, and Ravindra Tiwari. "Framework for Detecting Distributed Denial of Services Attack in Cloud Environment." International Journal of Innovative Research in Computer and Communication Engineering 12, Special Is (2024): 43–48. http://dx.doi.org/10.15680/ijircce.2024.1203507.
Full textUlemale, Tejaswini. "Review on Detection of DDOS Attack using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 764–68. http://dx.doi.org/10.22214/ijraset.2022.40742.
Full textTekleselassie, Hailye. "A Deep Learning Approach for DDoS Attack Detection Using Supervised Learning." MATEC Web of Conferences 348 (2021): 01012. http://dx.doi.org/10.1051/matecconf/202134801012.
Full textZhao, Yuntao, Hengchi Liu, and Yongxin Feng. "An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy." Journal of Electrical and Computer Engineering 2016 (2016): 1–5. http://dx.doi.org/10.1155/2016/2579274.
Full textSuharti, Sri, Anton Yudhana, and Imam Riadi. "Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 21, no. 3 (2022): 567–82. http://dx.doi.org/10.30812/matrik.v21i3.1732.
Full text