Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • with fear 2022-03-15 Paper Utilization of puzzles for protection against DDoS attacks 2022-02-18 Paper PAPR reduction in MIMO-OFDM by using active partial...
    10 bytes (18 words) - 07:44, 12 December 2023
  • Distributed Denial of Service Attack Based on Multi-feature Fusion 2010-04-23 Paper DDoS Attack Detection Using Three-State Partition Based on Flow Interaction 2010-04-23...
    10 bytes (16 words) - 19:43, 26 December 2023
  • hyperchaotic non linear dynamical systems 2019-11-07 Paper Low rate cloud DDoS attack defense method based on power spectral density analysis 2018-07-17...
    10 bytes (16 words) - 18:29, 13 December 2023
  • mardi4nfdi.de/entity/Q4585624 2018-09-06 Paper Modelling and simulations for DDoS attacks mitigation in identifier–locator split network 2014-01-29 Paper A...
    10 bytes (17 words) - 12:14, 12 December 2023
  • generalized Cauchy type 2013-06-11 Paper A model to partly but reliably distinguish DDOS flood traffic from aggregated one 2013-06-11 Paper Solving Abel's type integral...
    10 bytes (17 words) - 22:08, 10 December 2023
  • vision processing 2010-12-23 Paper An adaptive approach for defending against DDoS attacks 2010-06-29 Paper Nonlinear time-varying spectral analysis: HHT and...
    10 bytes (17 words) - 17:41, 11 December 2023
  • Distributed Denial of Service Attack Based on Multi-feature Fusion 2010-04-23 Paper DDoS Attack Detection Using Three-State Partition Based on Flow Interaction 2010-04-23...
    10 bytes (16 words) - 03:23, 28 December 2023
  • Type Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking 2010-06-29 Paper...
    10 bytes (16 words) - 15:57, 6 October 2023
  • Publication Date of Publication Type Preventing DDoS attacks on internet servers exploiting P2P systems 2010-11-25 Paper...
    10 bytes (16 words) - 11:34, 6 October 2023
  • Publication Date of Publication Type Preventing DDoS attacks on internet servers exploiting P2P systems 2010-11-25 Paper...
    10 bytes (16 words) - 11:34, 6 October 2023
  • Publication Date of Publication Type Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks 2022-02-21...
    10 bytes (14 words) - 23:07, 27 December 2023
  • Publication Date of Publication Type Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks 2022-02-21...
    10 bytes (14 words) - 23:07, 27 December 2023
  • Publication Date of Publication Type Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks 2022-02-21...
    10 bytes (18 words) - 23:07, 27 December 2023
  • Publication Date of Publication Type Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks 2022-02-21...
    10 bytes (14 words) - 23:07, 27 December 2023
  • Publication Date of Publication Type DDoS defense algorithm based on multi-segment timeout technology 2007-06-01 Paper...
    10 bytes (17 words) - 03:30, 28 December 2023
  • Publication Type Exact and approximation algorithms for sensor placement against DDoS attacks 2022-05-23 Paper...
    10 bytes (16 words) - 02:52, 7 October 2023
  • Publication Date of Publication Type Detection and Classification of DDoS Attacks Using Fuzzy Inference System 2010-10-28 Paper...
    10 bytes (18 words) - 06:33, 7 October 2023
  • Publication Date of Publication Type Detection and Classification of DDoS Attacks Using Fuzzy Inference System 2010-10-28 Paper...
    10 bytes (16 words) - 06:33, 7 October 2023
  • Publication Date of Publication Type Detection and Classification of DDoS Attacks Using Fuzzy Inference System 2010-10-28 Paper...
    10 bytes (16 words) - 06:33, 7 October 2023
  • Publication Date of Publication Type Utilization of puzzles for protection against DDoS attacks 2022-02-18 Paper...
    10 bytes (18 words) - 21:32, 26 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)