Contents
Academic literature on the topic 'Detection of slow attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detection of slow attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Detection of slow attacks"
Baldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP Distributed Denial of Service Attack Detection in Cloud." Scalable Computing: Practice and Experience 20, no. 2 (2019): 285–98. http://dx.doi.org/10.12694/scpe.v20i2.1501.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment." Scalable Computing: Practice and Experience 20, no. 4 (2019): 669–85. http://dx.doi.org/10.12694/scpe.v20i4.1569.
Full textSikora, Marek, Radek Fujdiak, Karel Kuchar, Eva Holasova, and Jiri Misurec. "Generator of Slow Denial-of-Service Cyber Attacks." Sensors 21, no. 16 (2021): 5473. http://dx.doi.org/10.3390/s21165473.
Full textPrathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Full textSavchenko, Vitalii. "Detection of Slow DDoS Attacks based on User’s Behavior Forecasting." International Journal of Emerging Trends in Engineering Research 8, no. 5 (2020): 2019–25. http://dx.doi.org/10.30534/ijeter/2020/90852020.
Full textZhang, Wei, Shaohua Teng, Haibin Zhu, and Dongning Liu. "A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies." International Journal of Agent Technologies and Systems 5, no. 3 (2013): 54–74. http://dx.doi.org/10.4018/ijats.2013070104.
Full textSatterfield, Kelly, Vincent F. Mancuso, Adam Strang, Eric Greenlee, Brent Miller, and Gregory J. Funke. "When actions speak louder than words: Using changes in operator behavior and system efficiency measures to detect the presence of a cyber attack." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 270–71. http://dx.doi.org/10.1177/1541931218621062.
Full textChen, Li Ming, Shun-Wen Hsiao, Meng Chang Chen, and Wanjiun Liao. "Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis." IEEE Systems Journal 10, no. 4 (2016): 1326–37. http://dx.doi.org/10.1109/jsyst.2014.2348567.
Full text