Academic literature on the topic 'UDP attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'UDP attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "UDP attacks"
Fatkieva, R. R., A. S. Sudakov, and A. S. Nersisyan. "Key Characteristics of Network Traffic to Identify DDoS Attacks." LETI Transactions on Electrical Engineering & Computer Science 17, no. 8 (2024): 65–80. http://dx.doi.org/10.32603/2071-8985-2024-17-8-65-80.
Full textTumbinskaya, Marina V., Vasily V. Vоlkоv, and Bulat G. Zagidullin. "Use of statistical methods for analysis and forecast of udp-flood attacks." Journal Of Applied Informatics 15, no. 89 (2020): 85–102. http://dx.doi.org/10.37791/2687-0649-2020-15-5-85-102.
Full textRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textNuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textWarcita, Kurniabudi, and Eko Arip Winanto. "Detection of UDP Flooding DDoS Attacks on IoT Networks Using Recurrent Neural Network." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 13, no. 3 (2024): 471–81. https://doi.org/10.23887/janapati.v13i3.79601.
Full textTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Full textNedyalkov, Ivan. "Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams." Future Internet 17, no. 4 (2025): 139. https://doi.org/10.3390/fi17040139.
Full textAlexis Fidele, Kagiraneza, Suryono, and Wahyul Amien Syafei. "Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment." E3S Web of Conferences 202 (2020): 15003. http://dx.doi.org/10.1051/e3sconf/202020215003.
Full textJoseph, Ofir, Avshalom Elmalech, and Chen Hajaj. "Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning." Electronics 12, no. 5 (2023): 1091. http://dx.doi.org/10.3390/electronics12051091.
Full textWang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textDissertations / Theses on the topic "UDP attacks"
Muharish, Essa Yahya M. "PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/342.
Full textPlašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.
Full textJawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.
Full textMontes, Larios Jose Manuel, and Hernández Manuel Antonio Iturrizaga. "Diseño de arquitectura de seguridad perimetral para una empresa dedicada a la actividad inmobiliaria." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1285.
Full textStéen, Alexandra. "Räck upp handen! Vem vill bli spottad i ansiktet på jobbet? : En rättsdogmatisk studie om polisens möjligheter till kränkningsersättning när de själva blir ett brottsoffer." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68921.
Full textMontoya, Maxime. "Sécurité adaptative et énergétiquement efficace dans l’Internet des Objets." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM032.
Full textWei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.
Full textBooks on the topic "UDP attacks"
ill, Carter David A., ed. Snack attack: A tasty pop-up book. Simon and Schuster Books for Young Readers, 1990.
Find full textMorton, Robert. Sir Rutherford Alcock. Amsterdam University Press, 2024. https://doi.org/10.5117/9789463725293.
Full textAtkins, Stephen E. The 9/11 Encyclopedia [2 volumes]. Praeger, 2008. http://dx.doi.org/10.5040/9798216190325.
Full textMickolus, Edward F., and Susan L. Simmons. Terrorism, 1996-2001. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216192497.
Full textWard, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.
Full textAtkins, Stephen, ed. The 9/11 Encyclopedia. 2nd ed. ABC-CLIO, 2011. http://dx.doi.org/10.5040/9798400605918.
Full textSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Full textKachun, Mitch. Michelle Obama, the Media Circus, and America’s Racial Obsession. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036606.003.0004.
Full textCollins, John, and Tamara Dobler, eds. Reply to François Recanati. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198783916.003.0020.
Full textBook chapters on the topic "UDP attacks"
Booth, Todd G., and Karl Andersson. "Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19210-9_1.
Full textBoro, Debojit, Himant Basumatary, Tribeni Goswami, and Dhruba K. Bhattacharyya. "UDP Flooding Attack Detection Using Information Metric Measure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_16.
Full textMuthurajkumar, S., A. Geetha, S. Aravind, and H. Barakath Meharajnisa. "UDP Flooding Attack Detection Using Entropy in Software-Defined Networking." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3951-8_42.
Full textIhsan, Zohair, Mohd Yazid Idris, Khalid Hussain, Deris Stiawan, and Khalid Mahmood Awan. "Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_24.
Full textMohan, V., B. K. Madhavi, and S. B. Kishor. "Deep Neural Network Model for UDP SYN Flood Distributed DoS Attack Detection in SDN." In Learning and Analytics in Intelligent Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82706-8_46.
Full textMopuri, Konda Reddy, Phani Krishna Uppala, and R. Venkatesh Babu. "Ask, Acquire, and Attack: Data-Free UAP Generation Using Class Impressions." In Computer Vision – ECCV 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01240-3_2.
Full textDasari, Kishorebabu, and Srinivas Mekala. "UDP Flood DDoS Attack Detection Using Multilayer Perceptron Different Optimization Techniques with Pearson, Spearman and Kendall Uncorrelated Feature Subsets." In Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2742-5_52.
Full textMohan, V., B. K. Madhavi, and S. B. Kishor. "Detection of UDP SYN Flood DDoS Attack Using Random Forest Machine Learning Algorithm in a Simulated Software Defined Network." In ICT for Intelligent Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3982-4_44.
Full textLiu, Huiwang, and Ya Li. "Query-UAP: Query-Efficient Universal Adversarial Perturbation for Large-Scale Person Re-Identification Attack." In Pattern Recognition and Computer Vision. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-18913-5_55.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch030.
Full textConference papers on the topic "UDP attacks"
Romadhon, Faizal Wahyu, Muhammad Azza Ulin Nuha, Yusuf Adiprawira, and Riri Fitri Sari. "Comparative Analysis of HAProxy and Nginx Load Balancers in Mitigating User Datagram Protocol (UDP) Flood Attacks." In 2024 12th International Conference on Information and Communication Technology (ICoICT). IEEE, 2024. http://dx.doi.org/10.1109/icoict61617.2024.10698656.
Full textSachdeva, Rachneet, Haritz Puerto, Tim Baumgärtner, et al. "UKP-SQuARE v2: Explainability and Adversarial Attacks for Trustworthy QA." In Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing: System Demonstrations. Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.aacl-demo.4.
Full textSong, Yufei, Ziqi Zhou, Minghui Li, et al. "PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation." In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890418.
Full textMenendez, C. M., V. Jovancicevic, S. Ramachandran, M. Morton, and D. Stegmann. "New Method for Assessing Corrosion under Iron Sulfide Deposits and CO2/H2S Conditions." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11265.
Full textWei, Hung-Chuan, Yung-Hao Tung, and Chia-Mu Yu. "Counteracting UDP flooding attacks in SDN." In 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, 2016. http://dx.doi.org/10.1109/netsoft.2016.7502468.
Full textMutu, Laura, Rania Saleh, and Ashraf Matrawy. "Improved SDN responsiveness to UDP flood attacks." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346900.
Full textThomas, Daniel R., Richard Clayton, and Alastair R. Beresford. "1000 days of UDP amplification DDoS attacks." In 2017 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 2017. http://dx.doi.org/10.1109/ecrime.2017.7945057.
Full textBiagioni, Edoardo. "Preventing UDP Flooding Amplification Attacks with Weak Authentication." In 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2019. http://dx.doi.org/10.1109/iccnc.2019.8685648.
Full textLee, Junseok, Minhyeong Kim, Wonjun Song, Younghoon Kim, and Dohyung Kim. "Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks." In SAC '24: 39th ACM/SIGAPP Symposium on Applied Computing. ACM, 2024. http://dx.doi.org/10.1145/3605098.3635885.
Full textWalia, Rubika, and Prachi Garg. "Cryptography: Analysis of SYN and UDP Attacks using wire shark." In 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST). IEEE, 2021. http://dx.doi.org/10.1109/iccmst54943.2021.00039.
Full textReports on the topic "UDP attacks"
Jenkins, Brian, Bruce Butterworth, and Sachi Yagu. Evolving Patterns of Violence in Developing Countries. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2024.2344.
Full textde Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textKula, Gregory J. Assessing the Effects of Computer Network and Electronic Attack: Does Joint Doctrine Measure Up? Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada504932.
Full textFloyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textTanaka, Eri, Regina Schwerd, Wolfgang Hofbauer, and Daniel Zirkelbach. Laboratory tests on decay of natural fibre insulation materials suggest a more differentiated evaluation and higher RH thresholds. Department of the Built Environment, 2023. http://dx.doi.org/10.54337/aau541651346.
Full textZheng, Ruo-xiang, Xun Li, Jing Li, et al. Does Chinese herbal remedy Tangcao tablet work for the treatment of HIV/AIDS:a systematic review of controlled clinical trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.6.0042.
Full textDrury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.
Full textKemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.
Full textErol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.
Full textLahti, Yannick, and Emilia Palonen. The impact of the Russia–Ukraine war on right-wing populism in Finland. European Center for Populism Studies (ECPS), 2023. http://dx.doi.org/10.55271/rp0018.
Full text