Littérature scientifique sur le sujet « Distributed attacks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Distributed attacks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Distributed attacks"

1

Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.

Texte intégral
Résumé :
Distributed Denial of Service (DDoS) attacks take full advantage of distributed networks by sending a relentless barrage of requests to a target server to disrupt the regular operation of the server. The main difference between a DDoS attack and a traditional Denial of Service (DoS) attack is its decentralized nature. This characteristic increases the attack's impact and thus creates incredible difficulty in prevention. Traditional DDoS strategies cover flooding attacks (e.g., TCP SYN and UDP floods), protocol usage techniques (e.g., SYN floods and the infamous Ping of Death), and resource exh
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.

Texte intégral
Résumé :
Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on DDoS attack behavior, the current study uses logistic function as basis to propose a dynamic model of DDoS attacks with defending strategy decisions. Thereafter, the attacked threshold of this model is calculated. The existence and stability of attack-free and attacked equilibria are proved. Lastly, some effective strategies to mitigate DDoS attacks are suggested through parameter
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.

Texte intégral
Résumé :
This article analyzes distributed cyberattacks of the “Denial of Service” type and develops their classification. A description of the shortcomings and vulnerabilities of distributed denial-of-service attacks by category is given. An implementation diagram with examples for each category of distributed denial of service attacks is presented. Analyzed the number of attacks carried out by attackers, as well as the purpose and type of attack used. According to the results of the study, the UDP-flood 53.64% attack type is the most commonly used type by attackers in implementing distributed attacks
Styles APA, Harvard, Vancouver, ISO, etc.
4

Saba Abdulbaqi Salman, Sufyan Al-Janabi, and Ali Makki Sagheer. "Security Attacks on E-Voting System Using Blockchain." Iraqi Journal For Computer Science and Mathematics 4, no. 2 (2023): 179–88. http://dx.doi.org/10.52866/ijcsm.2023.02.02.016.

Texte intégral
Résumé :
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, and the time in which it achieved 51% of the attack was calculated. In this study, we investigate of Blockchain technology’s attack surface, focusing on general blockchains. The following factors show how these attacks have an impact on the proposed model: 1) The cryptogra
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chaudhary, Sachin, and Kanchan Chaudhary. "Distributed Honeypots System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 5–11. http://dx.doi.org/10.51976/ijari.121302.

Texte intégral
Résumé :
Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, Honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them.
Styles APA, Harvard, Vancouver, ISO, etc.
6

K.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.

Texte intégral
Résumé :
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With little or no warning, a DDoS attack could easily destroy its victim's communication and network resources in a short period of time. This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. Important features of each attack and defense system category are described and advantages and disadvantages
Styles APA, Harvard, Vancouver, ISO, etc.
7

Karthikeyani, R., and E. Karthikeyan. "A Review on Distributed Denial of Service Attack." Asian Journal of Research in Computer Science 16, no. 4 (2023): 133–44. http://dx.doi.org/10.9734/ajrcos/2023/v16i4378.

Texte intégral
Résumé :
Today’s world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutions has shifted from offline to online. It leads to exponential increase in intrusions and attacks over the internet-based technologies. Distributed denial of service (DDOS) attack is one of the most dangerous attack that could cause devastating effects on the internet. These attacks are becoming more complex and expected to expand in number day after day, rendering detecting and combating these threats challenging. In network
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kasture, Pradnya. "DDoS Attack Detection using ML." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.

Texte intégral
Résumé :
Abstract: DDoS attacks are an attempt to prevent the service from being unavailable by overloading the server with malicious traffic. In the past few years, distributed denial of service attacks is becoming the most difficult and burdensome problem. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. As there are different attack patterns or new types of attacks, it is difficult to detect such attacks effectively. New techniques for generating and mitigating distributed denial of service attacks have been developed in the prese
Styles APA, Harvard, Vancouver, ISO, etc.
9

Riyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.

Texte intégral
Résumé :
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as d
Styles APA, Harvard, Vancouver, ISO, etc.
10

Riskhan, Basheer, Halawati Abd Jalil Safuan, Khalid Hussain, et al. "An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment." Sensors 23, no. 14 (2023): 6574. http://dx.doi.org/10.3390/s23146574.

Texte intégral
Résumé :
Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky’s Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflect
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Distributed attacks"

1

Li, Chi-Pan. "A distributed scheme to detect and defend against distributed denial of service attacks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20LI.

Texte intégral
Résumé :
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003.<br>Includes bibliographical references (leaves 102-107). Also available in electronic version. Access restricted to campus users.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Namuduri, Sarita. "Distributed Denial of Service Attacks (DDoS)- Consequences and Future." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8055.

Texte intégral
Résumé :
<p>Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. The first is an overview of the current situation and also brief explanatory of the rest of the chapters being covered. The second is a detailed description of exactly how this attack works, and why it is hard to cope with today; of necessity it
Styles APA, Harvard, Vancouver, ISO, etc.
3

Ramanauskaitė, Simona. "Modelling and Research of Distributed Denial of Service Attacks." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120723_105031-70003.

Texte intégral
Résumé :
In the dissertation the Denial of Service (DoS) attacks and their models are investigated. DoS attack is a type of cyber attacks when an attacker tries to deny a service in the network machine. There are many types of DoS attacks, and therefore the main object of the dissertation is specified as distributed denial of service (DDoS) attacks. DDoS uses multiple agents at the same time to exhaust certain resources of network machine and make it unavailable. The importance of DDoS attacks can be explained on the basis of the following facts: nowadays there are no countermeasures which can ensure f
Styles APA, Harvard, Vancouver, ISO, etc.
4

Thing, Vrizlynn Ling Ling. "Adaptive Response System for Distributed Denial-of-Service Attacks." Thesis, Imperial College London, 2008. http://hdl.handle.net/10044/1/4264.

Texte intégral
Résumé :
The continued prevalence and severe damaging effects of the Distributed Denial of Service (DDoS) attacks in today’s Internet raise growing security concerns and call for an immediate response to come up with better solutions to tackle DDoS attacks. The current DDoS prevention mechanisms are usually inflexible and determined attackers with knowledge of these mechanisms, could work around them. Most existing detection and response mechanisms are standalone systems which do not rely on adaptive updates to mitigate attacks. As different responses vary in their “leniency” in treating detected at
Styles APA, Harvard, Vancouver, ISO, etc.
5

Karandikar, Sampada. "Analysis of distributed denial of service attacks and countermeasures." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1263409912/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Bhatia, Sajal. "Detecting distributed Denial-of-Service attacks and Flash Events." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/62031/1/Sajal_Bhatia_Thesis.pdf.

Texte intégral
Résumé :
This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines to disrupt the normal operations of a Web-service provider, resulting in significant down-time and financial losses. This thesis also develops methods to differentiate these attacks from similar-looking benign surges in web-traffic known as Flash Events (FEs). This thesis also addresses an intrinsic challenge in research associated with DDoS attacks, namely, the extreme scarcity of publi
Styles APA, Harvard, Vancouver, ISO, etc.
7

Eklund, Martin, and Patrik Ståhlberg. "Distributed denial of service attacks : Protection, Mitigation, and Economic Consequences." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170924.

Texte intégral
Résumé :
Distributed Denial of Service attacks is a problem that constantly threatens companies that rely on the internet for major parts of their business. A successful DDoS attack that manages to penetrate a company’s network can lead to devastating damages in the form of lost income, reduced productivity, increase in costs, and damage to the company’s image and reputation. The different DDoS attacks are many and of different character and often Offer different parts of the network, which makes it very difficult to defend against. It is also very clear that DDoS attacks are increasing in both numbers
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.

Texte intégral
Résumé :
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce
Styles APA, Harvard, Vancouver, ISO, etc.
9

Negi, Chandan Singh. "Using network management systems to detect Distributed Denial of Service Attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397257.

Texte intégral
Résumé :
Thesis (M.S. in Information Systems Technology and M.S. in Computer Science)--Naval Postgraduate School, Sept. 2001.<br>Thesis advisors, Bordetsky, Alex ; Clark, Paul. "September 2001." Includes bibliographical references (p. 115-117). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Aditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.

Texte intégral
Résumé :
In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such systems. From the customer’s perspective, one of the big risks in adopting big data systems is in trusting the service provider who designs and owns the infrastructure, with data security and privacy. However, big data frameworks typically focus on performance and the opportunity for including enhanced security measures is limited. In this dissertation, the problem of mitigating insider attacks is extensively investigated and several stati
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Distributed attacks"

1

Brooks, Richard R., and İlker Özçelik. Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9491-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [publisher not identified], 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Singh, Rajeev, and Mangey Ram, eds. Distributed Denial of Service Attacks. De Gruyter, 2021. http://dx.doi.org/10.1515/9783110619751.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Distributed Denial of Service Attacks. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Distributed Denial of Service (ddos) Attacks. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Distributed attacks"

1

Abhishta, Abhishta, Marianne Junger, Reinoud Joosten, and Lambert J. M. Nieuwenhuis. "A Note on Analysing the Attacker Aims Behind DDoS Attacks." In Intelligent Distributed Computing XIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32258-8_30.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Berbecaru, Diana Gratiela, and Stefano Giannuzzi. "Fighting TLS Attacks: An Autoencoder-Based Model for Heartbleed Attack Detection." In Intelligent Distributed Computing XVI. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60023-4_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Brooks, Richard R., and İlker Özçelik. "Introduction." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Brooks, Richard R., and İlker Özçelik. "Attack Mitigation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Demirci, Mehmet. "Security and DDoS in SDN: Opportunities and Challenges." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Biron, Zoleikha Abdollahi, and Pierluigi Pisu. "Denial of Service Attack in Control Systems." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Arunagirinathan, Paranietharan, Richard R. Brooks, Iroshani Jayawardene, et al. "Denial of Service Attack on Phasor Measurement unit 1." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Brooks, Richard R., and İlker Özçelik. "DDoS Lab." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Brooks, Richard R., and İlker Özçelik. "Conclusion." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Zhong, Xingsi, and Oluwakemi Ade Aina. "Appendix." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Distributed attacks"

1

Sharma, Neeraj, and Kalpesh Kapoor. "Attacks in Distributed Routing Protocols in PCNs." In 2024 IEEE International Conference on Blockchain (Blockchain). IEEE, 2024. http://dx.doi.org/10.1109/blockchain62396.2024.00014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Li, Kecheng, Genyuan Yang, Shanling Dong, and Meiqin Liu. "Distributed Attack Detection of Multi-area Power Systems Against False Data Injection Attacks." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10661728.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Segura, Gustavo A. Nunez, Arsenia Chorti, and Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.

Texte intégral
Résumé :
Software-Defined Networking has been used to leverage security solutions for wireless sensor networks. However, this paradigm turns networks vulnerable to distributed denial of service attacks. IDIT-SDN is a tool for Software-defined Wireless Sensor Networks devised for DoS and DDoS attacks simulation and detection. This tool provides a framework for anomaly detection and a communication protocol to share security wise information from the sensor network to the controller. We demonstrate its use by showing a cooperative DDoS attack detection and attacker identification application based on dis
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mergendahl, Samuel, Nathan Burow, and Hamed Okhravi. "Cross-Language Attacks." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24078.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mukkamala, S., K. Yendrapalli, R. B. Basnet, and A. H. Sung. "Detecting Coordinated Distributed Multiple Attacks." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.149.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Blackstone, Laura, Seny Kamara, and Tarik Moataz. "Revisiting Leakage Abuse Attacks." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23103.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Schwarzl, Martin, Erik Kraft, Moritz Lipp, and Daniel Gruss. "Remote Memory-Deduplication Attacks." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.23081.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Liu, Donggang, and Qi Dong. "Combating side-channel attacks using key management." In Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161248.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Xia, Hui, Rui Zhang, Zi Kang, Shuliang Jiang, and Shuo Xu. "Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack." In Network and Distributed System Security Symposium. Internet Society, 2024. http://dx.doi.org/10.14722/ndss.2024.23164.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Liu, Yugeng, Zheng Li, Michael Backes, Yun Shen, and Yang Zhang. "Backdoor Attacks Against Dataset Distillation." In Network and Distributed System Security Symposium. Internet Society, 2023. http://dx.doi.org/10.14722/ndss.2023.24287.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Distributed attacks"

1

Dong Wei, Yan Lu, Mohsen Jafari, Paul Skare, and Kenneth Rohde. Protecting Intelligent Distributed Power Grids against Cyber Attacks. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1033753.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Mankins, David, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada406438.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Baras, J. S., A. A. Cardenas, and V. Ramezani. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada439768.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Nir, Y., and V. Smyslov. Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc8019.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Texte intégral
Résumé :
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
Styles APA, Harvard, Vancouver, ISO, etc.
6

Blackert, W. J., R. L. Hom, A. K. Castner, R. M. Jokerst, and D. M. Gregg. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA). Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429339.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Soramäki, Kimmo. Financial Cartography. FNA, 2019. http://dx.doi.org/10.69701/ertx8007.

Texte intégral
Résumé :
Geographic maps have been of military and economic importance throughout the ages. Rulers have commissioned maps to control the financial, economic, political, and military aspects of their sovereign entities. Large scale projects like the Ordnance Survey in the UK in the late 18th century, and the Lewis and Clark Expedition a few decades later to map the American West, are early examples of trailblazing efforts to create accurate modern maps of high strategic importance. Digitalization, globalization, and a larger urban and educated workforce necessitate a new understanding of the world, beyo
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ameri, Samuel, and Patrick Szary. PB2006105744 Needs for Oil and Gas Pipeline Safety and Security. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0012127.

Texte intégral
Résumé :
Pipelines are by far the most important mode of petroleum transportation in the United States because of their remarkable efficiency and low transportation cost. Pipelines carry two-thirds of the energy consumed by our nation and are recognized as the safest and most economical way to distribute vast quantities of oil and gas from production fields to refineries to consumers for a foreseeable future. This sophisticated network of gathering and distribution systems comprises 2.3 million miles of pipelines-varying in size from 2 inches to 60 inches in diameter. Pipelines are vital to a nation's
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!