Academic literature on the topic 'Flooding distributed denial of service attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Flooding distributed denial of service attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Flooding distributed denial of service attacks"
Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textAli, Raza. "Detection of DDoS attack in cloud computing and its prevention: a systematic review." i-manager’s Journal on Cloud Computing 9, no. 1 (2022): 1. http://dx.doi.org/10.26634/jcc.9.1.18542.
Full textNashat, Dalia, Fatma A. Hussain, and Xiaohong Jiang. "Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio." Journal of Networking and Network Applications 1, no. 2 (2021): 67–74. http://dx.doi.org/10.33969/j-nana.2021.010204.
Full textGhazali. "Flooding Distributed Denial of Service Attacks-A Review." Journal of Computer Science 7, no. 8 (2011): 1218–23. http://dx.doi.org/10.3844/jcssp.2011.1218.1223.
Full textSINGH, SATWINDER, ABHINAV BHANDARI, KRISHAN KUMAR SALUJA, and A. L. SANGAL. "Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks." International Journal of Computer Networks and Communications Security 8, no. 1 (2020): 1–9. http://dx.doi.org/10.47277/ijcncs/8(1)1.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textR., Ramkumar, Rahul R., and Gowtham Sri. "Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1657–64. https://doi.org/10.5281/zenodo.14776346.
Full textKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, et al. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textSaurabh Kansal. "DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION USING REINFORCEMENT LEARNING." Journal of Sustainable Solutions 2, no. 1 (2025): 11–18. https://doi.org/10.36676/j.sust.sol.v2.i1.54.
Full textNarote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Full textDissertations / Theses on the topic "Flooding distributed denial of service attacks"
Namuduri, Sarita. "Distributed Denial of Service Attacks (DDoS)- Consequences and Future." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8055.
Full textRamanauskaitė, Simona. "Modelling and Research of Distributed Denial of Service Attacks." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120723_105031-70003.
Full textThing, Vrizlynn Ling Ling. "Adaptive Response System for Distributed Denial-of-Service Attacks." Thesis, Imperial College London, 2008. http://hdl.handle.net/10044/1/4264.
Full textKarandikar, Sampada. "Analysis of distributed denial of service attacks and countermeasures." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1263409912/.
Full textBhatia, Sajal. "Detecting distributed Denial-of-Service attacks and Flash Events." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/62031/1/Sajal_Bhatia_Thesis.pdf.
Full textEklund, Martin, and Patrik Ståhlberg. "Distributed denial of service attacks : Protection, Mitigation, and Economic Consequences." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170924.
Full textLi, Chi-Pan. "A distributed scheme to detect and defend against distributed denial of service attacks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20LI.
Full textNegi, Chandan Singh. "Using network management systems to detect Distributed Denial of Service Attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397257.
Full textMcNevin, Timothy John. "Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/31941.
Full textVordos, Ioannis. "Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FVordos.pdf.
Full textBooks on the topic "Flooding distributed denial of service attacks"
Brooks, Richard R., and İlker Özçelik. Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125.
Full textSingh, Rajeev, and Mangey Ram, eds. Distributed Denial of Service Attacks. De Gruyter, 2021. http://dx.doi.org/10.1515/9783110619751.
Full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.
Full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textRam, Mangey, and Rajeev Singh. Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.
Find full textBook chapters on the topic "Flooding distributed denial of service attacks"
Khandare, Hrishikesh, Saurabh Jain, and Rajesh Doriya. "A Survey on HTTP Flooding—A Distributed Denial of Service Attack." In Pervasive Computing and Social Networking. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2840-6_4.
Full textYang, Guosong, and João P. Hespanha. "Modeling and Mitigating Link-Flooding Distributed Denial-of-Service Attacks via Learning in Stackelberg Games." In Handbook of Reinforcement Learning and Control. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60990-0_15.
Full textBrooks, Richard R., and İlker Özçelik. "Introduction." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-1.
Full textBrooks, Richard R., and İlker Özçelik. "Attack Mitigation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-10.
Full textDemirci, Mehmet. "Security and DDoS in SDN: Opportunities and Challenges." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-11.
Full textBiron, Zoleikha Abdollahi, and Pierluigi Pisu. "Denial of Service Attack in Control Systems." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-12.
Full textArunagirinathan, Paranietharan, Richard R. Brooks, Iroshani Jayawardene, et al. "Denial of Service Attack on Phasor Measurement unit 1." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-13.
Full textBrooks, Richard R., and İlker Özçelik. "DDoS Lab." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-14.
Full textBrooks, Richard R., and İlker Özçelik. "Conclusion." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-15.
Full textZhong, Xingsi, and Oluwakemi Ade Aina. "Appendix." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-16.
Full textConference papers on the topic "Flooding distributed denial of service attacks"
Sardana, Jyotsana, Sunil Kumar, Dharminder Kumar, and Kamlesh Dutta. "Denial of Service (DoS) Attacks in SDN-Based VANETs: A Study." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984030.
Full textKharchouf, Ibtissam, Hossam M. Hussein, Mahmoud S. Abdelrahman, S. M. Sajjad Hossain Rafin, and Osama A. Mohammed. "Cyber-Physical Testbed for Distributed Consensus Control Amid Denial of Service Attacks." In 2024 IEEE International Conference on Environment and Electrical Engineering and 2024 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe). IEEE, 2024. http://dx.doi.org/10.1109/eeeic/icpseurope61470.2024.10751374.
Full textAjeesh, Arunima, and Tessy Mathew. "NeuralGuard5G: Enhancing 5G Network Slice Security Against Distributed Denial of Service Attacks." In 2024 International Conference on Artificial Intelligence and Emerging Technology (Global AI Summit). IEEE, 2024. https://doi.org/10.1109/globalaisummit62156.2024.10947868.
Full textTripathi, Sarvapriya, Himanshu Upadhyay, and Jayesh Soni. "Quantum Long Sort-Term Memory-based Identification of Distributed Denial of Service Attacks." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10849228.
Full textJavadpour, Amir, Forough Ja'fari, Tarik Taleb, and Chafika Benzaïd. "5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871675.
Full textSingh, Jagendra, Jabir Ali, Preeti Sharma, Vinish Kumar, Meenakshi Sharma, and Ramendra Singh. "Mitigating Distributed Denial of Service (DDoS) Attacks in Cloud Networks Using Neural Networks." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00036.
Full textKunna, Etidal Altom, Mohd Nizam Omar, and Mohamad Fadli bin Zolkipli. "Detecting Distributed Denial of Service Attacks in Software Defined Network Controllers: Proposed Research." In 2024 7th International Conference on Internet Applications, Protocols, and Services (NETAPPS). IEEE, 2024. https://doi.org/10.1109/netapps63333.2024.10823571.
Full textJiang, Hong, Shuqiao Chen, Hongchao Hu, and Mingming Zhang. "Superpoint-based detection against distributed denial of service (DDoS) flooding attacks." In 2015 IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN). IEEE, 2015. http://dx.doi.org/10.1109/lanman.2015.7114724.
Full textChinnasamy, P., Sai Devika, V. Balaji, S. Dhanasekaran, B. Jency A. Jebamani, and Ajmeera Kiran. "BDDoS: Blocking Distributed Denial of Service Flooding Attacks With Dynamic Path Detectors." In 2023 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2023. http://dx.doi.org/10.1109/iccci56745.2023.10128499.
Full textRagu, V., and P. Jesu Jayarin. "Detecting flooding attacks in distributed denial of service attacks using deep neural network compared with naive bayes." In INTERNATIONAL CONFERENCE ON APPLICATION OF ARTIFICIAL INTELLIGENCE FOR RENEWABLE ENERGY SOURCES AND ENVIRONMENTAL SUSTAINABILITY. AIP Publishing, 2025. https://doi.org/10.1063/5.0258744.
Full textReports on the topic "Flooding distributed denial of service attacks"
Mankins, David, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada406438.
Full textNir, Y., and V. Smyslov. Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc8019.
Full text