Articles de revues sur le sujet « Distributed attacks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Distributed attacks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Texte intégralZhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.
Texte intégralKadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.
Texte intégralSaba Abdulbaqi Salman, Sufyan Al-Janabi, and Ali Makki Sagheer. "Security Attacks on E-Voting System Using Blockchain." Iraqi Journal For Computer Science and Mathematics 4, no. 2 (2023): 179–88. http://dx.doi.org/10.52866/ijcsm.2023.02.02.016.
Texte intégralChaudhary, Sachin, and Kanchan Chaudhary. "Distributed Honeypots System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 5–11. http://dx.doi.org/10.51976/ijari.121302.
Texte intégralK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Texte intégralKarthikeyani, R., and E. Karthikeyan. "A Review on Distributed Denial of Service Attack." Asian Journal of Research in Computer Science 16, no. 4 (2023): 133–44. http://dx.doi.org/10.9734/ajrcos/2023/v16i4378.
Texte intégralKasture, Pradnya. "DDoS Attack Detection using ML." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Texte intégralRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Texte intégralRiskhan, Basheer, Halawati Abd Jalil Safuan, Khalid Hussain, et al. "An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment." Sensors 23, no. 14 (2023): 6574. http://dx.doi.org/10.3390/s23146574.
Texte intégralLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Texte intégralKumar, Aman. "Distributed Denial of Service (DDoS) Attack Mitigation using AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5706–14. https://doi.org/10.22214/ijraset.2025.69632.
Texte intégralMou, Jinping. "Adaptive Consensus of Distributed Varying Scale Wireless Sensor Networks under Tolerable Jamming Attacks." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/931934.
Texte intégralGavrić, Nikola, and Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat." Sensors 22, no. 20 (2022): 7791. http://dx.doi.org/10.3390/s22207791.
Texte intégralPrenzel, Björn G., William G. Laidlaw, and Hal Wieser. "WITHIN-TREE DYNAMICS OF MASS ATTACK BY DENDROCTONUS PSEUDOTSUGAE (COLEOPTERA: SCOLYTIDAE) ON ITS HOST." Canadian Entomologist 131, no. 5 (1999): 635–43. http://dx.doi.org/10.4039/ent131635-5.
Texte intégralManaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Texte intégralLi, Wenpei, Han Fu, Shun Wu, Bin Yang, and Zhixiong Liu. "A Kalman Filter-Based Distributed Cyber-Attack Mitigation Strategy for Distributed Generator Units in Meshed DC Microgrids." Energies 16, no. 24 (2023): 7959. http://dx.doi.org/10.3390/en16247959.
Texte intégralK., Thamizhmaran. "Enhanced Secure Technique for Detecting Attacks in Network." Journal of Advancement in Electronics Design 3, no. 3 (2020): 1–6. https://doi.org/10.5281/zenodo.4223718.
Texte intégralLi, Yufeng, Le Tian, Han Qiu, and Chuanhao Zhang. "Research Notes: Distributed Shadow for Router Security Defense." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (2018): 193–206. http://dx.doi.org/10.1142/s021819401840003x.
Texte intégralShui, Yongtao, Yu Wang, Yu Li, Yongzhi Shan, Naigang Cui, and Baojun Pang. "Consensus-Based Distributed Target Tracking with False Data Injection Attacks over Radar Network." Applied Sciences 11, no. 10 (2021): 4564. http://dx.doi.org/10.3390/app11104564.
Texte intégralFatkieva, R. R., A. S. Sudakov, and A. S. Nersisyan. "Key Characteristics of Network Traffic to Identify DDoS Attacks." LETI Transactions on Electrical Engineering & Computer Science 17, no. 8 (2024): 65–80. http://dx.doi.org/10.32603/2071-8985-2024-17-8-65-80.
Texte intégralNuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.
Texte intégralKareem, Morenikeji Kabirat, Olaniyi Dada Aborisade, Saidat Adebukola Onashoga, Tole Sutikno, and Olaniyi Mathew Olayiwola. "Efficient model for detecting application layer distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 441–50. http://dx.doi.org/10.11591/eei.v12i1.3871.
Texte intégralKumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Texte intégralAdam Zukhruf, Bagus Fatkhurrozi, and Andriyatna Agung Kurniawan. "COMPARATIVE STUDY OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK DETECTION IN COMPUTER NETWORKS." Jurnal Teknik Informatika (Jutif) 4, no. 5 (2023): 1033–39. http://dx.doi.org/10.52436/1.jutif.2023.4.5.756.
Texte intégralDhanapal, A., and P. Nithyanandam. "The Slow HTTP Distributed Denial of Service Attack Detection in Cloud." Scalable Computing: Practice and Experience 20, no. 2 (2019): 285–98. http://dx.doi.org/10.12694/scpe.v20i2.1501.
Texte intégralAdhikary, Kaushik, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta. "Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (2020): 1–18. http://dx.doi.org/10.4018/ijsppc.2020100101.
Texte intégralBaird, Iain, Isam Wadhaj, Baraq Ghaleb, and Craig Thomson. "Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs)." Electronics 13, no. 16 (2024): 3314. http://dx.doi.org/10.3390/electronics13163314.
Texte intégralAl-Mashadani, Abdulrahman Khalid Abdullah, and Muhammad Ilyas. "Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network." Webology 19, no. 1 (2022): 4129–44. http://dx.doi.org/10.14704/web/v19i1/web19272.
Texte intégralRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Texte intégralVolokyta, Artem, and Mykyta Melenchukov. "NEURAL NETWORKS IN DETECTING ATTACKS ON DISTRIBUTED SYSTEMS." TECHNICAL SCIENCES AND TECHNOLOGIES, no. 1(35) (2024): 135–45. http://dx.doi.org/10.25140/2411-5363-2024-1(35)-135-145.
Texte intégralLi, Ming, and Wei Zhao. "Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack." Mathematical Problems in Engineering 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/475878.
Texte intégralYaseen, Hiba Salah, and Ahmed Al-Saadi. "Q-learning based distributed denial of service detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 972. http://dx.doi.org/10.11591/ijece.v13i1.pp972-986.
Texte intégralHiba, Salah Yaseen, and Al-Saadi Ahmed. "Q-learning based distributed denial of service detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 972–86. https://doi.org/10.11591/ijece.v13i1.pp972-986.
Texte intégralKotey, Seth, Eric Tchao, and James Gadze. "On Distributed Denial of Service Current Defense Schemes." Technologies 7, no. 1 (2019): 19. http://dx.doi.org/10.3390/technologies7010019.
Texte intégralShazly, Khadija, Dina A. Salem, Nacereddine Hammami, and Ahmed I. B. ElSeddawy. "A Review on Distributed Denial of Service Detection in Software Defined Network." International Journal of Wireless and Ad Hoc Communication 5, no. 2 (2022): 08–18. http://dx.doi.org/10.54216/ijwac.050201.
Texte intégralR K, Monika, and Ravikumar K. "PROTECTING VIRTUALIZED INFRASTRUCTURES IN CLOUD COMPUTING BASED ON BIG DATA SECURITY ANALYTICS." ICTACT Journal on Soft Computing 11, no. 2 (2021): 2306–15. https://doi.org/10.21917/ijsc.2021.0330.
Texte intégralLi, Xi, Songhe Wang, Ruiquan Huang, Mahanth Gowda, and George Kesidis. "Temporal-Distributed Backdoor Attack against Video Based Action Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 4 (2024): 3199–207. http://dx.doi.org/10.1609/aaai.v38i4.28104.
Texte intégralZhang, Yan, Yong Wang, Yihua Hu, et al. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack." Sensors 22, no. 19 (2022): 7286. http://dx.doi.org/10.3390/s22197286.
Texte intégralSingh, Karanbir, Kanwalvir Singh Dhindsa, and Bharat Bhushan. "Distributed Defense: An Edge over Centralized Defense against DDos Attacks." International Journal of Computer Network and Information Security 9, no. 3 (2017): 36–44. http://dx.doi.org/10.5815/ijcnis.2017.03.05.
Texte intégralZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.
Texte intégralZeebaree, Subhi R. M., Karzan H. Sharif, and Roshna M. Mohammed Amin. "Application Layer Distributed Denial of Service Attacks Defense Techniques : A review." Academic Journal of Nawroz University 7, no. 4 (2018): 113. http://dx.doi.org/10.25007/ajnu.v7n4a279.
Texte intégralSambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Texte intégralSong, Zhenghang, Xiang Wang, Baoze Wei, Zhengyu Shan, and Peiyuan Guan. "Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack." Mathematics 11, no. 9 (2023): 2103. http://dx.doi.org/10.3390/math11092103.
Texte intégralJaideep, Gera, and Bhanu Prakash Battula. "Detection of DDOS attacks in distributed peer to peer networks." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1051. http://dx.doi.org/10.14419/ijet.v7i2.7.12227.
Texte intégralČerňanský, Michal, Ladislav Huraj, and Marek Šimon. "Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure." Journal of information and organizational sciences 44, no. 2 (2020): 297–316. http://dx.doi.org/10.31341/jios.44.2.6.
Texte intégralCheng, Zhijian, Guanjun Chen, Xiao-Meng Li, and Hongru Ren. "Consensus-Based Power System State Estimation Algorithm Under Collaborative Attack." Sensors 24, no. 21 (2024): 6886. http://dx.doi.org/10.3390/s24216886.
Texte intégralLe, Jian, Jing Wang, Hongke Lang, and Weihao Wang. "Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm." Sensors 25, no. 8 (2025): 2551. https://doi.org/10.3390/s25082551.
Texte intégralManita, Mohamed Sasi, and Ahmed Ibrahim Suleiman. "Training Machine Learning Algorithms to Detect Distributed Denial of Service Attacks." International Science and Technology Journal 34, no. 2 (2024): 1–23. http://dx.doi.org/10.62341/msai2687.
Texte intégralSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Texte intégral