Academic literature on the topic 'Internet attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Internet attack"
Ourston, Dirk, Sara Matzner, William Stump, and Bryan Hopkins. "Coordinated Internet attacks: responding to attack complexity." Journal of Computer Security 12, no. 2 (2004): 165–90. http://dx.doi.org/10.3233/jcs-2004-12201.
Full textPeterson, A. Padgett. "Internet attack mechanisms." Network Security 1996, no. 5 (1996): 17–19. http://dx.doi.org/10.1016/1353-4858(96)81911-8.
Full textR., Ramkumar, Rahul R., and Gowtham Sri. "Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1657–64. https://doi.org/10.5281/zenodo.14776346.
Full textChristopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textZafri, Fizza. "Ransomware Attacks in History of Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 39–43. http://dx.doi.org/10.22214/ijraset.2022.39758.
Full textKarthikeyani, R., and E. Karthikeyan. "A Review on Distributed Denial of Service Attack." Asian Journal of Research in Computer Science 16, no. 4 (2023): 133–44. http://dx.doi.org/10.9734/ajrcos/2023/v16i4378.
Full textWu, Yixin, Cheng Huang, Xing Zhang, and Hongyi Zhou. "GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things." Security and Communication Networks 2020 (December 4, 2020): 1–14. http://dx.doi.org/10.1155/2020/8842539.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textDissertations / Theses on the topic "Internet attack"
Arikan, Erinc. "Attack profiling for DDoS benchmarks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file Mb., 96 p, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1435821.
Full textAtiiq, Syafiq Al. "Adaptive Counteraction Against Denial of Service Attack." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219382.
Full textBeaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Full textPathan, Sakib, and Erik Stenström. "Säkerhetsfrågor beträffande Sakernas Internet med fokus på fastighetsinfrastruktur." Thesis, KTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168949.
Full textSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Full textAlserhani, Faeiz. "A framework for correlation and aggregation of security alerts in communication networks : a reasoning correlation and aggregation approach to detect multi-stage attack scenarios using elementary alerts generated by Network Intrusion Detection Systems (NIDS) for a global security perspective." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5430.
Full textMargotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.
Full textAhmim, Ilyes. "L'amélioration de la sécurité dans l'internet des objets." Electronic Thesis or Diss., Université Gustave Eiffel, 2025. https://these.univ-paris-est.fr/intranet/2025/UEFL-2025/TH2025UEFL2011.pdf.
Full textNguyen, Lien K. "Predicting catastrophic BGP routing instabilities." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1642.
Full textBooks on the topic "Internet attack"
Jelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Prentice Hall Professional Technical Reference, 2005.
Find full textE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford University Press, 2003.
Find full text1953-, Rubin Charles, ed. Guerrilla marketing online attack: 100 low-cost, high-impact strategies for creating profits on the Internet. Piatkus, 1996.
Find full textScience, United States Congress House Committee on. Cyber security-how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.
Find full textUnited States. Congress. House. Committee on Science. Cyber security--how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.
Find full textUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. "Cyber attack: Improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. U.S. G.P.O., 2001.
Find full textDwivedi, Himanshu. Hacking VoIP: Protocols, attacks, and countermeasures. No Starch Press, 2009.
Find full textKrinklebine, Karlos. Hacking Wall Street: Attacks and countermeasures. [Darkwave Press], 2009.
Find full textLi, Wenjuan, Steven Furnell, and Weizhi Meng, eds. Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21311-3.
Full textBook chapters on the topic "Internet attack"
Haber, Morey J., and Brad Hibbert. "Internet of Things (IoT)." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_14.
Full textHaber, Morey J. "Industrial Control Systems (ICS) and Internet of Things (IoT)." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_14.
Full textChow, Man Chun, Maode Ma, and Zhijin Pan. "Attack Models and Countermeasures for Autonomous Vehicles." In Internet of Things. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76493-7_12.
Full textGoyal, Sanjeev, Shahin Jabbari, Michael Kearns, Sanjeev Khanna, and Jamie Morgenstern. "Strategic Network Formation with Attack and Immunization." In Web and Internet Economics. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-54110-4_30.
Full textChen, Zhou, Yukun Cheng, Xiaotie Deng, Qi Qi, and Xiang Yan. "Limiting User’s Sybil Attack in Resource Sharing." In Web and Internet Economics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71924-5_8.
Full textShin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.
Full textAnwar, Raja Waseem, and Kashif Naseer Qureshi. "Attack Detection Mechanisms for Internet of Everything (IoE) Networks." In Internet of Things. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45162-1_3.
Full textHalvorsen, Finn M., Olav Haugen, Martin Eian, and Stig F. Mjølsnes. "An Improved Attack on TKIP." In Identity and Privacy in the Internet Age. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04766-4_9.
Full textChang, Chunjie, Changhua Zhu, Honggang Wang, and Changxing Pei. "Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack." In Internet of Things. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32427-7_18.
Full textThomas, Arun, T. Gireesh Kumar, and Ashok Kumar Mohan. "Neighbor Attack Detection in Internet of Things." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8237-5_18.
Full textConference papers on the topic "Internet attack"
Wang, Yikun, Hewu Li, Zeqi Lai, and Jihao Li. "StarMaze: Ring-based Attack in Satellite Internet Constellations." In 2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS). IEEE, 2024. http://dx.doi.org/10.1109/iwqos61813.2024.10682867.
Full textElSalamony, Fares, Nahla Barakat, and Ahmad Mostafa. "Unravelling the Sequential Patterns of Cyber Attacks: A Temporal Analysis of Attack Dependencies." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013436500003944.
Full textUmesh, Umesh, Sunil Kumar, Kamlesh Dutta, and Aparna Kumari. "Securing Internet of Medical Things: Exploring Vulnerabilities and Attack Vectors." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984079.
Full textYang, Kun, Tianyi Luo, Yanjie Dong, and Aohan Li. "A Seesaw Model Attack Algorithm for Distributed Learning." In 2024 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE, 2024. https://doi.org/10.1109/smartiot62235.2024.00025.
Full textGhafoori, Nasratullah, and Atsuko Miyaji. "The Boomerang Attack on ChaCha Stream Cipher Permutation." In 2024 6th International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2024. http://dx.doi.org/10.1109/iccci62159.2024.10674399.
Full textAl-Qudah, Rabiah, Neveen Mohammad Hijazi, Moayad Aloqaily, Mohsen Guizani, and Bassem Ouni. "Federated Learning Security: An Incremental Distributed Attack Approach." In 2024 IEEE 10th World Forum on Internet of Things (WF-IoT). IEEE, 2024. https://doi.org/10.1109/wf-iot62078.2024.10811131.
Full textMurthy, Ashwin, Muralidhar Kurni, Souptik Sen, and Ramesh Krishnamaneni. "A Modified Linknet Architecture for Attack Detection in Internet of Things." In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS). IEEE, 2024. http://dx.doi.org/10.1109/iicccs61609.2024.10763633.
Full textMansoor-ul-haque, Hassan Asghart, Muhammad Hanif Durad, and Anila Usmanl. "Detection of Internet Layer DoS Attack on Cloud Using Deep Learning." In 2023 20th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2023. http://dx.doi.org/10.1109/ibcast59916.2023.10713027.
Full textHappy, Asif Iqubal, and Subodh Kant Tiwari. "Internet of Vehicle (IoV) Cyber Attack Detection using Machine Learning Techniques." In 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE). IEEE, 2024. https://doi.org/10.1109/aece62803.2024.10911517.
Full textShrivastava, Anurag, Tanusha Mittal, Muntather Almusawi, Yogendra Kumar, R. J. Anandhi, and Munugapati Bhavana. "Analysis of Apt Attack for Source Tracing in Industrial Internet Environment." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828843.
Full textReports on the topic "Internet attack"
Lee, David, and Ten H. Lai. Internet Attack Traceback: Cross-Validation and Pebble-Trace. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada578556.
Full textMoriarty, K., and M. Ford. Coordinating Attack Response at Internet Scale (CARIS) Workshop Report. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8073.
Full textMoriarty, K. Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8953.
Full textDroogan, Julian, Lise Waldek, Brian Ballsun-Stanton, and Jade Hutchinson. Mapping a Social Media Ecosystem: Outlinking on Gab & Twitter Amongst the Australian Far-right Milieu. RESOLVE Network, 2022. http://dx.doi.org/10.37805/remve2022.6.
Full textHoffman, P., and B. Schneier. Attacks on Cryptographic Hashes in Internet Protocols. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4270.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textKim, Kyoung-Sook, and Jiyeong Lee, eds. An Extension Model to attach Points of Interest into IndoorGML. Open Geospatial Consortium, Inc., 2021. http://dx.doi.org/10.62973/20-054r1.
Full textChristie, Lorna. Physical threats to infrastructure. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs23.
Full textNir, Y., and V. Smyslov. Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc8019.
Full textTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full text