Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0730-x
Abstract: This paper presents a review of current denial of service (DoS) attack and defence concepts, from a theoretical ad practical point of view. Seriousness of DoS attacks is tangible and they present one of the…
read more here.
Keywords:
research;
dos;
denial service;
service attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1149-0
Abstract: Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows…
read more here.
Keywords:
network;
denial service;
cloud;
intrusion detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Science China Information Sciences"
DOI: 10.1007/s11432-018-9583-2
Abstract: In recent years, networked control systems (NCSs) have received ever-increasing interest from researchers owing to the advantages of improving flexibility and efficiency of systems and decreasing maintenance costs. However, the growing openness of NCSs, highly…
read more here.
Keywords:
control systems;
control;
denial service;
networked control ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2017 at "Neurocomputing"
DOI: 10.1016/j.neucom.2017.02.093
Abstract: This paper focuses on resilient control of networked control systems (NCSs) under the denial of service (DoS) attacks characterized by a Markov process. Firstly, based on the game between attack strategies and defense strategies, the…
read more here.
Keywords:
control systems;
control networked;
control;
denial service ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Neurocomputing"
DOI: 10.1016/j.neucom.2018.02.086
Abstract: Abstract This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint.…
read more here.
Keywords:
attack;
estimation;
energy;
denial service ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2793841
Abstract: Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive, and smart…
read more here.
Keywords:
resource;
denial service;
sensor nodes;
sensor networks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2922196
Abstract: Recently, software defined networks (SDNs) and cloud computing have been widely adopted by researchers and industry. However, widespread acceptance of these novel networking paradigms has been hampered by the security threats. Advances in the processing…
read more here.
Keywords:
ddos attacks;
denial service;
cloud computing;
sdn cloud ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3190008
Abstract: Nowadays, it is common for applications to require servers to run constantly and aim as close as possible to zero downtime. The slightest failure might cause significant financial losses and sometimes even lives. For this…
read more here.
Keywords:
network;
recurrent unit;
gated recurrent;
deep learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3191430
Abstract: The potential for being the target of Denial of Service (DoS) attacks is one of the most severe security threats on the Internet. Attackers have been modifying their attack format over the years, damaging specific…
read more here.
Keywords:
service;
survey;
rate;
detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3196642
Abstract: This document classifies, selects and trains a deep learning algorithm to create an IDS/IPS (Intrusion Prevention/Detection System) called Dique, which can detect and prevent denial of service (DoS) attacks. To mitigate DoS attacks, the IDS/IPS…
read more here.
Keywords:
system;
dos attacks;
detection;
deep learning ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3222488
Abstract: Traffic safety and efficiency are extremely significant in both private and public transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to share information among vehicles for helping drivers and passengers. Since the vehicle broadcasts the…
read more here.
Keywords:
service dos;
msr dos;
vehicular networks;
denial service ... See more keywords