Artículos de revistas sobre el tema "DDoS-Protection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "DDoS-Protection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Reynolds, Roy. "It's time to rethink DDoS protection". Network Security 2020, n.º 1 (enero de 2020): 6–8. http://dx.doi.org/10.1016/s1353-4858(20)30007-6.
Texto completoShah, Harshil, Priyansh Shah y Swapna Naik. "DDOS Protection by Dividing and Limiting". International Journal of Computer Applications 155, n.º 11 (15 de diciembre de 2016): 12–14. http://dx.doi.org/10.5120/ijca2016912251.
Texto completoEvglevskaya, N. V., A. Yu Zuev, A. O. Karasenko y O. S. Lauta. "Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks". Radio industry (Russia) 30, n.º 3 (8 de septiembre de 2020): 67–74. http://dx.doi.org/10.21778/2413-9599-2020-30-3-67-74.
Texto completoMahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar y Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids". Security and Communication Networks 2021 (20 de marzo de 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.
Texto completoSelvakani, S., K. Vasumathi, T. Vijayalakshmi y A. Kavitha. "Attack in SDN Based Distributed Denial of Service". Asian Journal of Engineering and Applied Technology 10, n.º 1 (5 de mayo de 2021): 38–44. http://dx.doi.org/10.51983/ajeat-2021.10.1.2802.
Texto completoRebecchi, Filippo, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet y Vania Conan. "DDoS protection with stateful software-defined networking". International Journal of Network Management 29, n.º 1 (9 de agosto de 2018): e2042. http://dx.doi.org/10.1002/nem.2042.
Texto completoKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny y Adam Marks. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments". Security and Communication Networks 2021 (22 de abril de 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Texto completoSaleh, Mohammed A. y Azizah Abdul Manaf. "A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks". Scientific World Journal 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/238230.
Texto completoLe, Duc, Minh Dao y Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN". Information and Control Systems, n.º 3 (15 de junio de 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Texto completoJili, Tianwen y Nanfeng Xiao. "DDoS Detection and Protection Based on Cloud Computing Platform". Journal of Physics: Conference Series 1621 (agosto de 2020): 012005. http://dx.doi.org/10.1088/1742-6596/1621/1/012005.
Texto completoQudah, Zakaria Al, Basheer Al Duwairi y Osama Al Khaleel. "DDoS protection as a service: hiding behind the giants". International Journal of Computational Science and Engineering 9, n.º 4 (2014): 292. http://dx.doi.org/10.1504/ijcse.2014.060711.
Texto completoBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam y Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 6 (1 de diciembre de 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Texto completoEt. al., Dr Shanti Rathore,. "Multipath Reliable Routing Using Cluster Based Communication". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (10 de abril de 2021): 3210–15. http://dx.doi.org/10.17762/turcomat.v12i2.2378.
Texto completoMazur, Katarzyna, Bogdan Ksiezopolski y Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks". Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Texto completoZhao, Yuntao, Wenbo Zhang, Yongxin Feng y Bo Yu. "A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack". Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9463653.
Texto completoA. Naagas, M., E. L. Mique Jr, T. D. Palaoag y J. S. Dela Cruz. "Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack". Bulletin of Electrical Engineering and Informatics 7, n.º 4 (1 de diciembre de 2018): 593–600. http://dx.doi.org/10.11591/eei.v7i4.1349.
Texto completoJeyanthi, N. y P. C. Mogankumar. "A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks". Cybernetics and Information Technologies 14, n.º 3 (1 de septiembre de 2014): 71–85. http://dx.doi.org/10.2478/cait-2014-0034.
Texto completoKim, Dae Hwan y Soo Jin Lee. "A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks". Journal of the Korea society of IT services 15, n.º 2 (30 de junio de 2016): 157–67. http://dx.doi.org/10.9716/kits.2016.15.2.157.
Texto completoKaur, Amarjeet, Gagandeep Kaur y Gagandeep Kaur. "DdoS Attack Detection on Cloud Environment in Wireless Sensor Network: A Review". International Journal of Advanced Research in Computer Science and Software Engineering 8, n.º 5 (2 de junio de 2018): 33. http://dx.doi.org/10.23956/ijarcsse.v8i5.662.
Texto completoTumbinskaya, Marina V., Vasily V. Vоlkоv y Bulat G. Zagidullin. "Use of statistical methods for analysis and forecast of udp-flood attacks". Journal Of Applied Informatics 15, n.º 89 (30 de octubre de 2020): 85–102. http://dx.doi.org/10.37791/2687-0649-2020-15-5-85-102.
Texto completoHosny, Khalid Mohamed, Ameer El-Sayed Gouda y Ehab Rushdy Mohamed. "New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks". International Journal of Sociotechnology and Knowledge Development 12, n.º 2 (abril de 2020): 1–30. http://dx.doi.org/10.4018/ijskd.2020040101.
Texto completoBorisenko, Konstantin, Ivan Kholod y Andrey Shorov. "Framework for Infrastructure Attack Modeling in Hybrid Networks". International Journal of Mobile Computing and Multimedia Communications 6, n.º 4 (octubre de 2014): 98–114. http://dx.doi.org/10.4018/ijmcmc.2014100106.
Texto completoKodada, Basappa B., Gaurav Prasad y Alwyn R. Pais. "Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment". International Journal of Computer Network and Information Security 4, n.º 7 (9 de julio de 2012): 12–18. http://dx.doi.org/10.5815/ijcnis.2012.07.02.
Texto completoFrancois, Jérôme, Issam Aib y Raouf Boutaba. "FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks". IEEE/ACM Transactions on Networking 20, n.º 6 (diciembre de 2012): 1828–41. http://dx.doi.org/10.1109/tnet.2012.2194508.
Texto completoBhardwaj, Akashdeep y Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks". International Journal of Cloud Applications and Computing 7, n.º 3 (julio de 2017): 59–75. http://dx.doi.org/10.4018/ijcac.2017070103.
Texto completoBACHMANOV, DMITRIY A., ANDREY R. OCHEREDKO, MICHAEL M. PUTYATO y ALEXANDER S. MAKARYAN. "RESEARCH OF THE ISSUES OF IMPROVEMENT OF PROTECTION SYSTEMS AGAINST DDOS-ATTACKS BASED ON THE COMPREHENSIVE ANALYSIS OF MODERN INTERACTION MECHANISMS". CASPIAN JOURNAL: Control and High Technologies 53, n.º 1 (2021): 63–74. http://dx.doi.org/10.21672/2074-1707.2021.53.1.063-074.
Texto completoSerrano Mamolar, Ana, Pablo Salvá-García, Enrique Chirivella-Perez, Zeeshan Pervez, Jose M. Alcaraz Calero y Qi Wang. "Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks". Journal of Network and Computer Applications 145 (noviembre de 2019): 102416. http://dx.doi.org/10.1016/j.jnca.2019.102416.
Texto completoHaining Wang y K. G. Shin. "Transport-aware IP routers: A built-in protection mechanism to counter DDoS attacks". IEEE Transactions on Parallel and Distributed Systems 14, n.º 9 (septiembre de 2003): 873–84. http://dx.doi.org/10.1109/tpds.2003.1233710.
Texto completo., Subhashini. "PROFILE BASED PROTECTION SCHEME AGAINST DDOS ATTACK IN WSN WITH DUAL CLUSTERING ALGORITHM". International Journal of Research in Engineering and Technology 04, n.º 14 (25 de abril de 2015): 29–32. http://dx.doi.org/10.15623/ijret.2015.0414008.
Texto completoWang, Bing, Yao Zheng, Wenjing Lou y Y. Thomas Hou. "DDoS attack protection in the era of cloud computing and Software-Defined Networking". Computer Networks 81 (abril de 2015): 308–19. http://dx.doi.org/10.1016/j.comnet.2015.02.026.
Texto completoWang, Li Hui. "Research on Security of P2P Technology". Applied Mechanics and Materials 644-650 (septiembre de 2014): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2826.
Texto completoAlatawi, Fahad. "Defense mechanisms against Distributed Denial of Service attacks: Comparative Review". Journal of Information Security and Cybercrimes Research 4, n.º 1 (1 de junio de 2021): 81–94. http://dx.doi.org/10.26735/lqez4186.
Texto completoDake, Delali Kwasi, James Dzisi Gadze, Griffith Selorm Klogo y Henry Nunoo-Mensah. "Multi-Agent Reinforcement Learning Framework in SDN-IoT for Transient Load Detection and Prevention". Technologies 9, n.º 3 (29 de junio de 2021): 44. http://dx.doi.org/10.3390/technologies9030044.
Texto completoMaqbool, Zohaib, Raja Habib, Tariq Aziz, Asma Maqbool y Oriba Altaf. "Internet Security Issues in Smart City Environment". Journal of Information Technology and Computing 1, n.º 1 (31 de diciembre de 2020): 14–30. http://dx.doi.org/10.48185/jitc.v1i1.49.
Texto completoVellalacheruvu, Hari Krishna y Sanjeev Kumar. "Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks". Journal of Information Security 02, n.º 03 (2011): 131–38. http://dx.doi.org/10.4236/jis.2011.23013.
Texto completoQin, Yu, Jingbin Liu, Shijun Zhao, Dengguo Feng y Wei Feng. "RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device". Security and Communication Networks 2020 (23 de septiembre de 2020): 1–14. http://dx.doi.org/10.1155/2020/8957641.
Texto completoIyengar, N. Ch S. N. y Gopinath Ganapathy. "Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment". Cybernetics and Information Technologies 15, n.º 2 (1 de junio de 2015): 119–40. http://dx.doi.org/10.1515/cait-2015-0033.
Texto completoSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe y Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks". Security and Communication Networks 2018 (10 de diciembre de 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Texto completoNgo, Duc-Minh, Cuong Pham-Quoc y Tran Ngoc Thinh. "An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks". Security and Communication Networks 2018 (24 de diciembre de 2018): 1–14. http://dx.doi.org/10.1155/2018/9562801.
Texto completoGhasabi, Mozhgan y Mahmood Deypir. "Using optimized statistical distances to confront distributed denial of service attacks in software defined networks". Intelligent Data Analysis 25, n.º 1 (26 de enero de 2021): 155–76. http://dx.doi.org/10.3233/ida-194796.
Texto completoAlkahtani, Hasan, Theyazn H. H. Aldhyani y Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace". Applied Bionics and Biomechanics 2020 (9 de diciembre de 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.
Texto completoKovalenko, Ya I. "THE NEED TO IMPLEMENT AT THE LEGISLATIVE LEVEL MEANS OF PROTECTION OF THE RIGHT TO A DOMAIN NAME FROM DOS (DDOS) ATTACKS IN UKRAINE". Juridical scientific and electronic journal, n.º 1 (2021): 84–87. http://dx.doi.org/10.32782/2524-0374/2021-1/18.
Texto completoZak, Michal y J. Andrew Ware. "Cloud based Distributed Denial of Service Alleviation System". Annals of Emerging Technologies in Computing 4, n.º 1 (1 de enero de 2020): 44–53. http://dx.doi.org/10.33166/aetic.2020.01.005.
Texto completoLakhno, Valerii, Andrii Blozva, Borys Husiev, Tetiana Osypova y Yurii Matus. "INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS". Cybersecurity: Education, Science, Technique 3, n.º 11 (2021): 5–99. http://dx.doi.org/10.28925/2663-4023.2021.11.8599.
Texto completoIsiaka, Fatima M., Salihu Abdullahi Audu y Mustafa Ahmed Umar. "Developing a fail-safe culture in a cyber environment using MySQL replication technique". International Journal of Crowd Science 4, n.º 2 (4 de abril de 2020): 149–70. http://dx.doi.org/10.1108/ijcs-04-2018-0008.
Texto completoKlymash, M. M., O. M. Shpur y N. V. Pelekh. "WEB SERVICE AVAILABILITY MONITORING IN DISTRIBUTED INFOCOMMUNICATION SYSTEMS". Visnyk Universytetu “Ukraina”, n.º 1 (28) 2020 (2020): 137–50. http://dx.doi.org/10.36994/2707-4110-2020-1-28-12.
Texto completoIvanova, Xenia A. "Online voting as an element of cybersecurity of megacities". Law Enforcement Review 3, n.º 2 (13 de septiembre de 2019): 31–37. http://dx.doi.org/10.24147/2542-1514.2019.3(2).31-37.
Texto completoAndrysiak, Tomasz, Łukasz Saganowski, Mirosław Maszewski y Piotr Grad. "A DDoS Attacks Detection Based on Conditional Heteroscedastic Time Series Models". Image Processing & Communications 20, n.º 1 (1 de marzo de 2015): 23–33. http://dx.doi.org/10.1515/ipc-2015-0027.
Texto completoApiecionek, Łukasz y Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection". JUCS - Journal of Universal Computer Science 26, n.º 11 (28 de noviembre de 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.
Texto completoWani, Azka y S. Revathi. "Ransomware protection in IoT using software defined networking". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 3 (1 de junio de 2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.
Texto completo