Dissertations / Theses on the topic 'Flooding attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 33 dissertations / theses for your research on the topic 'Flooding attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Margotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.
Full textDudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.
Full textYou, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.
Full textKang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.
Full textLee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.
Full textAkbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.
Full textSignorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109/document.
Full textBediako, Peter Ken. "Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66802.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Electronic Thesis or Diss., Paris 5, 2014. http://www.theses.fr/2014PA05S006.
Full textSignorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109.
Full textMouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textHu, Che-Wei, and 胡哲維. "Flooding Attack Prevention in Mobile Ad-hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/58371317933400904202.
Full textSun, Jia-Rong, and 孫加榮. "The Study on Investigation Procedure of Cybercrime for SYN Flooding Attack." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/58659357419922884220.
Full text黃小玲. "Design a Hybrid Flooding Attack Defense Scheme under the Cloud Computing Environment." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8kgstz.
Full textChen, Ching-Ru, and 陳慶儒. "A Detection Scheme for Flooding Attack on Application Layer based on Semantic Concept." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/38211153921649740071.
Full textYi-Hsing, Lin, and 林益興. "A Priority and Trust Value Scheme to Inhibit the Flooding Attack in Ad Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/01297367521738870405.
Full textWei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.
Full textGuo, Yinghua. "Defending MANETs against flooding attacks by detective measures." 2008. http://arrow.unisa.edu.au:8081/1959.8/45723.
Full textChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Full textLiu, Xin. "Mitigating Denial-of-Service Flooding Attacks with Source Authentication." Diss., 2012. http://hdl.handle.net/10161/5756.
Full textTsai, Shang-Ting, and 蔡尚庭. "Maintaining Suspicious Flows using Cache Replacement under Flooding Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/67987822495899340514.
Full textLien, Chih-Chieh, and 連志捷. "Detection Method Based on Reverse Proxy against Web Flooding Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/54904637344397782249.
Full textChen, Fu-ping, and 陳復平. "A Novel TCP Implementation for Defending Against TCP SYN Flooding Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45765546490259627806.
Full textSun, Wen-Chen, and 孫文駿. "On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59su3h.
Full text彭柏蒼. "A Study of Resisting Flooding Attacks in AODV Based Ad Hoc Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/80939054299659324744.
Full textLai, Shin-Pin, and 賴信斌. "A Semantic Rule-based Detection Scheme against Flooding Attacks on Application Layer." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/50416141122060759526.
Full textChiang, Min-Hung, and 江敏宏. "Using BGP Blackhole technology to prevent flooding-based distributed denial of service attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/17724540234650043223.
Full textTzeng-Yu, Chen. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709313176.
Full textChen, Tzeng-Yu, and 陳宗右. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/36453050738828817765.
Full text"A Proactive Approach to Detect IoT Based Flooding Attacks by Using Software Defined Networks and Manufacturer Usage Descriptions." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50539.
Full textChou, Kang-Hsien Lee Wang-Chien. "Self-determining forwarding scheme for defending against query-flooding based ddos attacks in unstructured peer-to-peer systems." 2008. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-3525/index.html.
Full textRasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.
Full text