Статті в журналах з теми "Link Flooding Attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-32 статей у журналах для дослідження на тему "Link Flooding Attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Повний текст джерелаWang, Xin, Xiaobo Ma, Jiahao Peng, Jianfeng Li, Lei Xue, Wenjun Hu, and Li Feng. "On Modeling Link Flooding Attacks and Defenses." IEEE Access 9 (2021): 159198–217. http://dx.doi.org/10.1109/access.2021.3131503.
Повний текст джерелаXue, Lei, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, and Guofei Gu. "LinkScope: Toward Detecting Target Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 13, no. 10 (October 2018): 2423–38. http://dx.doi.org/10.1109/tifs.2018.2815555.
Повний текст джерелаChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Повний текст джерелаWang, Lei, Qing Li, Yong Jiang, Xuya Jia, and Jianping Wu. "Woodpecker: Detecting and mitigating link-flooding attacks via SDN." Computer Networks 147 (December 2018): 1–13. http://dx.doi.org/10.1016/j.comnet.2018.09.021.
Повний текст джерелаWang, Juan, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, and Fajiang Yu. "Detecting and Mitigating Target Link-Flooding Attacks Using SDN." IEEE Transactions on Dependable and Secure Computing 16, no. 6 (November 1, 2019): 944–56. http://dx.doi.org/10.1109/tdsc.2018.2822275.
Повний текст джерелаLu, Ning, Junwei Zhang, Ximeng Liu, Wenbo Shi, and Jianfeng Ma. "STOP: A Service Oriented Internet Purification Against Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 17 (2022): 938–53. http://dx.doi.org/10.1109/tifs.2022.3152406.
Повний текст джерелаGkounis, Dimitrios, Vasileios Kotronis, Christos Liaskos, and Xenofontas Dimitropoulos. "On the Interplay of Link-Flooding Attacks and Traffic Engineering." ACM SIGCOMM Computer Communication Review 46, no. 2 (April 9, 2016): 5–11. http://dx.doi.org/10.1145/2935634.2935636.
Повний текст джерелаAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Повний текст джерелаRasool, Raihan ur, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar, and Wajid Rafique. "A survey of link flooding attacks in software defined network ecosystems." Journal of Network and Computer Applications 172 (December 2020): 102803. http://dx.doi.org/10.1016/j.jnca.2020.102803.
Повний текст джерелаMa, Xiaobo, Jianfeng Li, Yajuan Tang, Bo An, and Xiaohong Guan. "Protecting internet infrastructure against link flooding attacks: A techno-economic perspective." Information Sciences 479 (April 2019): 486–502. http://dx.doi.org/10.1016/j.ins.2018.04.050.
Повний текст джерелаChen, Yen-Hung, Yuan-Cheng Lai, Pi-Tzong Jan, and Ting-Yi Tsai. "A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network." Sensors 21, no. 4 (February 3, 2021): 1027. http://dx.doi.org/10.3390/s21041027.
Повний текст джерелаWang, Jiushuang, Ying Liu, Weiting Zhang, Xincheng Yan, Na Zhou, and Zhihong Jiang. "ReLFA: Resist link flooding attacks via renyi entropy and deep reinforcement learning in SDN-IoT." China Communications 19, no. 7 (July 2022): 157–71. http://dx.doi.org/10.23919/jcc.2022.07.013.
Повний текст джерелаRasool, Raihan ur, Khandakar Ahmed, Zahid Anwar, Hua Wang, Usman Ashraf, and Wajid Rafique. "CyberPulse++: A machine learning‐based security framework for detecting link flooding attacks in software defined networks." International Journal of Intelligent Systems 36, no. 8 (May 2, 2021): 3852–79. http://dx.doi.org/10.1002/int.22442.
Повний текст джерелаCervera, Gimer, Michel Barbeau, Joaquin Garcia-Alfaro, and Evangelos Kranakis. "A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs." Journal of Network and Computer Applications 36, no. 2 (March 2013): 744–55. http://dx.doi.org/10.1016/j.jnca.2012.12.013.
Повний текст джерелаJaiswal, Ms Rashmi, and Ms Chandramala Amarji. "A Distributed Intrusion Detection System for AODV Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1576–86. http://dx.doi.org/10.22214/ijraset.2022.46247.
Повний текст джерелаDefibaugh, Stephen, and Donna Schaeffer. "Can Attrition Theory Provide Insight for Cyber Warfare?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 55–62. http://dx.doi.org/10.34190/iccws.17.1.9.
Повний текст джерелаThanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.
Повний текст джерелаMa, Xiaobo, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony T. N. Miu, and Xiaohong Guan. "Randomized Security Patrolling for Link Flooding Attack Detection." IEEE Transactions on Dependable and Secure Computing 17, no. 4 (July 1, 2020): 795–812. http://dx.doi.org/10.1109/tdsc.2019.2892370.
Повний текст джерелаRavi, Nagarathna, S. Mercy Shalinie, and D. Danyson Jose Theres. "BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN." IEEE Transactions on Network and Service Management 17, no. 3 (September 2020): 1715–29. http://dx.doi.org/10.1109/tnsm.2020.2997734.
Повний текст джерелаRasool, Raihan Ur, Usman Ashraf, Khandakar Ahmed, Hua Wang, Wajid Rafique, and Zahid Anwar. "Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks." IEEE Access 7 (2019): 34885–99. http://dx.doi.org/10.1109/access.2019.2904236.
Повний текст джерелаAsahina, Hiromu, Kei Sakuma, Shuichiro Haruta, Hiroya Kato, and Iwao Sasase. "Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination." IEICE Communications Express 8, no. 7 (2019): 251–56. http://dx.doi.org/10.1587/comex.2019xbl0054.
Повний текст джерелаDeliwala, Priyanshi, Rutvij H. Jhaveri, and Sagar Ramani. "Machine learning in SDN networks for secure industrial cyber physical systems: a case of detecting link flooding attack." International Journal of Engineering Systems Modelling and Simulation 13, no. 1 (2022): 76. http://dx.doi.org/10.1504/ijesms.2022.122730.
Повний текст джерелаRamani, Sagar, Rutvij H. Jhaveri, and Priyanshi Deliwala. "Machine learning in SDN networks for secure industrial cyber physical systems: a case of detecting link flooding attack." International Journal of Engineering Systems Modelling and Simulation 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijesms.2021.10040840.
Повний текст джерелаUrtāns, Juris. "KOKNESE FRONT FORTIFICATIONS. TOO BIG TO BE SEEN." Culture Crossroads 19 (October 11, 2022): 200–217. http://dx.doi.org/10.55877/cc.vol19.42.
Повний текст джерелаChittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.
Повний текст джерелаSara, Jarso, Yusuf Haji, and Achamyelesh Gebretsadik. "Scabies Outbreak Investigation and Risk Factors in East Badewacho District, Southern Ethiopia: Unmatched Case Control Study." Dermatology Research and Practice 2018 (June 26, 2018): 1–10. http://dx.doi.org/10.1155/2018/7276938.
Повний текст джерелаJingjing, Zhou, Yang Tongyu, Zhang Jilin, Zhang Guohao, Li Xuefeng, and Pan Xiang. "Intrusion Detection Model for Wireless Sensor Networks Based on MC-GRU." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/2448010.
Повний текст джерелаChen, Xu, Wei Feng, Yantian Luo, Meng Shen, Ning Ge, and Xianbin Wang. "Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach." IEEE Internet of Things Journal, 2021, 1. http://dx.doi.org/10.1109/jiot.2021.3093538.
Повний текст джерелаRezapour, Amir, and Wen-Guey Tzeng. "RL-Shield: Mitigating Target Link-Flooding Attacks using SDN and Deep Reinforcement Learning Routing Algorithm." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3118081.
Повний текст джерелаMehrtens, Björn, Oliver Lojek, Viktoria Kosmalla, Thea Bölker, and Nils Goseberg. "Foredune growth and storm surge protection potential at the Eiderstedt Peninsula, Germany." Frontiers in Marine Science 9 (January 9, 2023). http://dx.doi.org/10.3389/fmars.2022.1020351.
Повний текст джерелаAbrahamse, Jaap Evert, and Erik Schmitz. "‘Batavische constantie’." Bulletin KNOB, September 20, 2022, 1–21. http://dx.doi.org/10.48003/knob.121.2022.3.757.
Повний текст джерела