Academic literature on the topic 'Distributed attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Distributed attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Distributed attacks"
Kotey, Seth, Eric Tchao, and James Gadze. "On Distributed Denial of Service Current Defense Schemes." Technologies 7, no. 1 (2019): 19. http://dx.doi.org/10.3390/technologies7010019.
Full textSambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Full textChaudhary, Sachin, and Kanchan Chaudhary. "Distributed Honeypots System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 5–11. http://dx.doi.org/10.51976/ijari.121302.
Full textManaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Full textGavrić, Nikola, and Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat." Sensors 22, no. 20 (2022): 7791. http://dx.doi.org/10.3390/s22207791.
Full textLi, Yufeng, Le Tian, Han Qiu, and Chuanhao Zhang. "Research Notes: Distributed Shadow for Router Security Defense." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (2018): 193–206. http://dx.doi.org/10.1142/s021819401840003x.
Full textShang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Full textZhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.
Full textTennakoon, Chaminda, and Subha Fernando. "Deep learning model for distributed denial of service (DDoS) detection." International Journal of ADVANCED AND APPLIED SCIENCES 9, no. 2 (2022): 109–18. http://dx.doi.org/10.21833/ijaas.2022.02.012.
Full textHromada, Viliam, Ladislav Öllős, and Pavol Zajac. "Using SAT solvers in large scale distributed algebraic attacks against low entropy keys." Tatra Mountains Mathematical Publications 64, no. 1 (2015): 187–203. http://dx.doi.org/10.1515/tmmp-2015-0048.
Full textDissertations / Theses on the topic "Distributed attacks"
Li, Chi-Pan. "A distributed scheme to detect and defend against distributed denial of service attacks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20LI.
Full textNamuduri, Sarita. "Distributed Denial of Service Attacks (DDoS)- Consequences and Future." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8055.
Full textRamanauskaitė, Simona. "Modelling and Research of Distributed Denial of Service Attacks." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120723_105031-70003.
Full textThing, Vrizlynn Ling Ling. "Adaptive Response System for Distributed Denial-of-Service Attacks." Thesis, Imperial College London, 2008. http://hdl.handle.net/10044/1/4264.
Full textKarandikar, Sampada. "Analysis of distributed denial of service attacks and countermeasures." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1263409912/.
Full textBhatia, Sajal. "Detecting distributed Denial-of-Service attacks and Flash Events." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/62031/1/Sajal_Bhatia_Thesis.pdf.
Full textEklund, Martin, and Patrik Ståhlberg. "Distributed denial of service attacks : Protection, Mitigation, and Economic Consequences." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170924.
Full textFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Full textNegi, Chandan Singh. "Using network management systems to detect Distributed Denial of Service Attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397257.
Full textAditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Full textBooks on the topic "Distributed attacks"
Brooks, Richard R., and İlker Özçelik. Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125.
Full textYu, Shui. Distributed Denial of Service Attack and Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9491-1.
Full textKim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [publisher not identified], 2021.
Find full textSingh, Rajeev, and Mangey Ram, eds. Distributed Denial of Service Attacks. De Gruyter, 2021. http://dx.doi.org/10.1515/9783110619751.
Full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.
Full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textBook chapters on the topic "Distributed attacks"
Abhishta, Abhishta, Marianne Junger, Reinoud Joosten, and Lambert J. M. Nieuwenhuis. "A Note on Analysing the Attacker Aims Behind DDoS Attacks." In Intelligent Distributed Computing XIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32258-8_30.
Full textBrooks, Richard R., and İlker Özçelik. "Introduction." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-1.
Full textBrooks, Richard R., and İlker Özçelik. "Attack Mitigation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-10.
Full textDemirci, Mehmet. "Security and DDoS in SDN: Opportunities and Challenges." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-11.
Full textBiron, Zoleikha Abdollahi, and Pierluigi Pisu. "Denial of Service Attack in Control Systems." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-12.
Full textArunagirinathan, Paranietharan, Richard R. Brooks, Iroshani Jayawardene, et al. "Denial of Service Attack on Phasor Measurement unit 1." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-13.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Lab." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-14.
Full textBrooks, Richard R., and İlker Özçelik. "Conclusion." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-15.
Full textZhong, Xingsi, and Oluwakemi Ade Aina. "Appendix." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-16.
Full textBrooks, Richard R., and İlker Özçelik. "What is DDoS?" In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-2.
Full textConference papers on the topic "Distributed attacks"
Mergendahl, Samuel, Nathan Burow, and Hamed Okhravi. "Cross-Language Attacks." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24078.
Full textBlackstone, Laura, Seny Kamara, and Tarik Moataz. "Revisiting Leakage Abuse Attacks." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23103.
Full textSchwarzl, Martin, Erik Kraft, Moritz Lipp, and Daniel Gruss. "Remote Memory-Deduplication Attacks." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.23081.
Full textMukkamala, S., K. Yendrapalli, R. B. Basnet, and A. H. Sung. "Detecting Coordinated Distributed Multiple Attacks." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.149.
Full textLiu, Donggang, and Qi Dong. "Combating side-channel attacks using key management." In Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161248.
Full textZhou, Junhao, Yufei Chen, Chao Shen, and Yang Zhang. "Property Inference Attacks Against GANs." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.23019.
Full textBracher, Annina, Eran Hof, and Amos Lapidoth. "Guessing Attacks on Distributed-Storage Systems." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282723.
Full textApostolaki, Maria, Gian Marti, Jan Muller, and Laurent Vanbever. "SABRE: Protecting Bitcoin against Routing Attacks." In Network and Distributed System Security Symposium. Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23252.
Full textRupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Poepper. "IMP4GT: IMPersonation Attacks in 4G NeTworks." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24283.
Full textInam, Muhammad Adil, Wajih Ul Hassan, Ali Ahad, et al. "Forensic Analysis of Configuration-based Attacks." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.23057.
Full textReports on the topic "Distributed attacks"
Dong Wei, Yan Lu, Mohsen Jafari, Paul Skare, and Kenneth Rohde. Protecting Intelligent Distributed Power Grids against Cyber Attacks. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1033753.
Full textMankins, David, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada406438.
Full textBaras, J. S., A. A. Cardenas, and V. Ramezani. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada439768.
Full textNir, Y., and V. Smyslov. Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc8019.
Full textBlackert, W. J., R. L. Hom, A. K. Castner, R. M. Jokerst, and D. M. Gregg. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA). Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429339.
Full text