Journal articles on the topic 'Link Flooding Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 journal articles for your research on the topic 'Link Flooding Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textWang, Xin, Xiaobo Ma, Jiahao Peng, Jianfeng Li, Lei Xue, Wenjun Hu, and Li Feng. "On Modeling Link Flooding Attacks and Defenses." IEEE Access 9 (2021): 159198–217. http://dx.doi.org/10.1109/access.2021.3131503.
Full textXue, Lei, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, and Guofei Gu. "LinkScope: Toward Detecting Target Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 13, no. 10 (October 2018): 2423–38. http://dx.doi.org/10.1109/tifs.2018.2815555.
Full textChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Full textWang, Lei, Qing Li, Yong Jiang, Xuya Jia, and Jianping Wu. "Woodpecker: Detecting and mitigating link-flooding attacks via SDN." Computer Networks 147 (December 2018): 1–13. http://dx.doi.org/10.1016/j.comnet.2018.09.021.
Full textWang, Juan, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, and Fajiang Yu. "Detecting and Mitigating Target Link-Flooding Attacks Using SDN." IEEE Transactions on Dependable and Secure Computing 16, no. 6 (November 1, 2019): 944–56. http://dx.doi.org/10.1109/tdsc.2018.2822275.
Full textLu, Ning, Junwei Zhang, Ximeng Liu, Wenbo Shi, and Jianfeng Ma. "STOP: A Service Oriented Internet Purification Against Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 17 (2022): 938–53. http://dx.doi.org/10.1109/tifs.2022.3152406.
Full textGkounis, Dimitrios, Vasileios Kotronis, Christos Liaskos, and Xenofontas Dimitropoulos. "On the Interplay of Link-Flooding Attacks and Traffic Engineering." ACM SIGCOMM Computer Communication Review 46, no. 2 (April 9, 2016): 5–11. http://dx.doi.org/10.1145/2935634.2935636.
Full textAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Full textRasool, Raihan ur, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar, and Wajid Rafique. "A survey of link flooding attacks in software defined network ecosystems." Journal of Network and Computer Applications 172 (December 2020): 102803. http://dx.doi.org/10.1016/j.jnca.2020.102803.
Full textMa, Xiaobo, Jianfeng Li, Yajuan Tang, Bo An, and Xiaohong Guan. "Protecting internet infrastructure against link flooding attacks: A techno-economic perspective." Information Sciences 479 (April 2019): 486–502. http://dx.doi.org/10.1016/j.ins.2018.04.050.
Full textChen, Yen-Hung, Yuan-Cheng Lai, Pi-Tzong Jan, and Ting-Yi Tsai. "A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network." Sensors 21, no. 4 (February 3, 2021): 1027. http://dx.doi.org/10.3390/s21041027.
Full textWang, Jiushuang, Ying Liu, Weiting Zhang, Xincheng Yan, Na Zhou, and Zhihong Jiang. "ReLFA: Resist link flooding attacks via renyi entropy and deep reinforcement learning in SDN-IoT." China Communications 19, no. 7 (July 2022): 157–71. http://dx.doi.org/10.23919/jcc.2022.07.013.
Full textRasool, Raihan ur, Khandakar Ahmed, Zahid Anwar, Hua Wang, Usman Ashraf, and Wajid Rafique. "CyberPulse++: A machine learning‐based security framework for detecting link flooding attacks in software defined networks." International Journal of Intelligent Systems 36, no. 8 (May 2, 2021): 3852–79. http://dx.doi.org/10.1002/int.22442.
Full textCervera, Gimer, Michel Barbeau, Joaquin Garcia-Alfaro, and Evangelos Kranakis. "A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs." Journal of Network and Computer Applications 36, no. 2 (March 2013): 744–55. http://dx.doi.org/10.1016/j.jnca.2012.12.013.
Full textJaiswal, Ms Rashmi, and Ms Chandramala Amarji. "A Distributed Intrusion Detection System for AODV Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1576–86. http://dx.doi.org/10.22214/ijraset.2022.46247.
Full textDefibaugh, Stephen, and Donna Schaeffer. "Can Attrition Theory Provide Insight for Cyber Warfare?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 55–62. http://dx.doi.org/10.34190/iccws.17.1.9.
Full textThanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.
Full textMa, Xiaobo, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony T. N. Miu, and Xiaohong Guan. "Randomized Security Patrolling for Link Flooding Attack Detection." IEEE Transactions on Dependable and Secure Computing 17, no. 4 (July 1, 2020): 795–812. http://dx.doi.org/10.1109/tdsc.2019.2892370.
Full textRavi, Nagarathna, S. Mercy Shalinie, and D. Danyson Jose Theres. "BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN." IEEE Transactions on Network and Service Management 17, no. 3 (September 2020): 1715–29. http://dx.doi.org/10.1109/tnsm.2020.2997734.
Full textRasool, Raihan Ur, Usman Ashraf, Khandakar Ahmed, Hua Wang, Wajid Rafique, and Zahid Anwar. "Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks." IEEE Access 7 (2019): 34885–99. http://dx.doi.org/10.1109/access.2019.2904236.
Full textAsahina, Hiromu, Kei Sakuma, Shuichiro Haruta, Hiroya Kato, and Iwao Sasase. "Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination." IEICE Communications Express 8, no. 7 (2019): 251–56. http://dx.doi.org/10.1587/comex.2019xbl0054.
Full textDeliwala, Priyanshi, Rutvij H. Jhaveri, and Sagar Ramani. "Machine learning in SDN networks for secure industrial cyber physical systems: a case of detecting link flooding attack." International Journal of Engineering Systems Modelling and Simulation 13, no. 1 (2022): 76. http://dx.doi.org/10.1504/ijesms.2022.122730.
Full textRamani, Sagar, Rutvij H. Jhaveri, and Priyanshi Deliwala. "Machine learning in SDN networks for secure industrial cyber physical systems: a case of detecting link flooding attack." International Journal of Engineering Systems Modelling and Simulation 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijesms.2021.10040840.
Full textUrtāns, Juris. "KOKNESE FRONT FORTIFICATIONS. TOO BIG TO BE SEEN." Culture Crossroads 19 (October 11, 2022): 200–217. http://dx.doi.org/10.55877/cc.vol19.42.
Full textChittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.
Full textSara, Jarso, Yusuf Haji, and Achamyelesh Gebretsadik. "Scabies Outbreak Investigation and Risk Factors in East Badewacho District, Southern Ethiopia: Unmatched Case Control Study." Dermatology Research and Practice 2018 (June 26, 2018): 1–10. http://dx.doi.org/10.1155/2018/7276938.
Full textJingjing, Zhou, Yang Tongyu, Zhang Jilin, Zhang Guohao, Li Xuefeng, and Pan Xiang. "Intrusion Detection Model for Wireless Sensor Networks Based on MC-GRU." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/2448010.
Full textChen, Xu, Wei Feng, Yantian Luo, Meng Shen, Ning Ge, and Xianbin Wang. "Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach." IEEE Internet of Things Journal, 2021, 1. http://dx.doi.org/10.1109/jiot.2021.3093538.
Full textRezapour, Amir, and Wen-Guey Tzeng. "RL-Shield: Mitigating Target Link-Flooding Attacks using SDN and Deep Reinforcement Learning Routing Algorithm." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3118081.
Full textMehrtens, Björn, Oliver Lojek, Viktoria Kosmalla, Thea Bölker, and Nils Goseberg. "Foredune growth and storm surge protection potential at the Eiderstedt Peninsula, Germany." Frontiers in Marine Science 9 (January 9, 2023). http://dx.doi.org/10.3389/fmars.2022.1020351.
Full textAbrahamse, Jaap Evert, and Erik Schmitz. "‘Batavische constantie’." Bulletin KNOB, September 20, 2022, 1–21. http://dx.doi.org/10.48003/knob.121.2022.3.757.
Full text