|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 538 occurrences of 244 keywords
|
|
|
Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Mark E. Snyder, Ravi Sundaram, Mayur Thakur |
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong |
Adaptive Defense Against Various Network Attacks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao |
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, simulation, performance evaluation, network monitoring, traffic analysis, Network level security and protection |
20 | Ming Li 0002, Shengquan Wang, Wei Zhao 0001 |
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
real-time detection, reliable detection, traffic constraint, Anomaly detection |
20 | David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam |
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
router throttling, network security, congestion control, distributed denial of service |
20 | Jelena Mirkovic, Peter L. Reiher |
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
fault tolerance, network monitoring, Network-level security and protection |
20 | Angelos Stavrou, Angelos D. Keromytis |
Countering DoS attacks with stateless multipath overlays. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
key agreement, spread-spectrum communications |
20 | Amitabh Saxena, Ben Soh |
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Yanxiang He, Wei Chen 0006, Bin Xiao 0001 |
Detecting SYN Flooding Attacks Near Innocent Side. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Miao Ma |
Tabu Marking Scheme for IP Traceback. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Vasilios A. Siris, Ilias Stavrakis |
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Erol Gelenbe, Michael Gellman, George Loukas |
An Autonomic Approach to Denial of Service Defence. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 |
Distributed Defense Against Distributed Denial-of-Service Attacks. |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin |
Apply Data Mining to Defense-in-Depth Network Security System. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Bao-Tung Wang, Henning Schulzrinne |
A denial-of-service-resistant IP traceback approach. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Ming Li 0002, Chi-Hung Chi, Dongyang Long |
Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Mihui Kim, Kijoon Chae |
Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Wu-chang Feng |
The case for TCP/IP puzzles. |
Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi |
Enlisting Hardware Architecture to Thwart Malicious Code Injection. |
SPC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan |
COSSACK: Coordinated Suppression of Simultaneous Attacks. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan |
COSSACK: Coordinated Suppression of Simultaneous Attacks. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
20 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
20 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. |
SIGCOMM |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid |
Autonomic Response to Distributed Denial of Service Attacks. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
16 | Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata |
Experimental Research on Personal Awareness and Behavior for Information Security Protection. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
virus infection, DDos, normalcy bias, psychology, botnet, virtual game |
16 | Joseph Idziorek, Mark Tannian |
Exploiting Cloud Utility Models for Profit and Ruin. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
utility compute model, fraudulent resource consumption attack, application-layer DDoS, cloud computing, anomaly detection |
16 | Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake |
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow |
16 | Sirisha Surisetty, Sanjeev Kumar |
Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
McAfee Firewall, NonPaged Pool Allocs, Ping flood attack, Distributed Denial of Service(DDoS) attack |
16 | Dong Yan, Yulong Wang, Sen Su, Fangchun Yang |
An Efficient Collaborative Traceback Scheme Based on Packet Digests Logging. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
SPIE, DCTS, collaborative plane, DDoS |
16 | Jie Wang 0001, Raphael C.-W. Phan, John N. Whitley, David J. Parish |
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Augmented Attack Tree, Modeling, DDoS, Bottom-up, Detection Algorithm |
16 | Chung-Hsin Liu, Wu-Fan Hsu |
The Study of Video Conference Transmission Security as an Example on Polycom. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
CIF, H.264, DDoS, H.263, Video Conference |
16 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
16 | Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu 0001 |
Building a SCADA Security Testbed. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Security, Testbed, DDoS, SCADA |
16 | Turker Akyuz, Ibrahim Sogukpinar |
Packet Marking with Distance Based Probabilities for IP Traceback. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
network security, DDoS attacks, IP Traceback, Probabilistic Packet Marking |
16 | Michael T. Goodrich |
Probabilistic packet marking for large-scale IP traceback. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
associate addresses, checksum cords, denial of service (DDOS), distributed, IP, traceback, probabilistic packet marking |
16 | Liming Lu, Mun Choon Chan, Ee-Chien Chang |
A general model of probabilistic packet marking for IP traceback. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
probabilistic packet marking (PPM), random packet marking (RPM), network security, entropy, DDoS, IP traceback |
16 | Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar |
Adaptive distributed mechanism against flooding network attacks based on machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks |
16 | Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne |
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. |
IPTComm |
2008 |
DBLP DOI BibTeX RDF |
Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection |
16 | Wei Yen, Jeng-Shian Sung |
Dynamic Probabilistic Packet Marking with Partial Non-Preemption. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
re-marking, convergence packet number, DDoS, IP traceback, probabilistic packet marking |
16 | Thomas Gamer, Michael Scharf |
Realistic simulation environments for IP-based networks. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
DDoS attack traffic, HOT-based router topologies, power law-based AS topologies, simulation environment, OMNeT++, traffic profiles |
16 | Chu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo |
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
QoS, network simulator, priority queue, DDoS attack |
16 | Agnieszka Prusiewicz |
A Multi-agent System for Computer Network Security Monitoring. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
multi-agent approach, DDos attack, Intrusion detection |
16 | George Lawton |
Stronger Domain Name System Thwarts Root-Server Attacks. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
root-server attacks, security, DDoS attacks |
16 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
16 | Yonggang Pang, Huiqiang Wang, Ye Du |
Experiment of Event Injection Technology for Network Dependability Evaluation. |
International Conference on Computational Science (3) |
2007 |
DBLP DOI BibTeX RDF |
event injection, Loadrunner, DDoS, dependability evaluation |
16 | Basheer Al-Duwairi, Govindarasu Manimaran |
Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
Internet security, DDoS attacks, IP traceback |
16 | Yu-Kuo Tseng, You-Yi Lu, Jen-Yi Huang, Wen-Shyong Hsieh, Bao Rong Chang, Yu-Chang Chen, Shi-Huang Chen |
ID-Based PPM for IP Traceback. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, DDoS, IP traceback, PPM |
16 | Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S. Sitharama Iyengar |
Authenticated Autonomous System Traceback. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
network security, DDoS, traceback |
16 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
16 | Frank Kargl, Jörn Maier, Michael Weber 0001 |
Protecting web servers from distributed denial of service attacks. |
WWW |
2001 |
DBLP DOI BibTeX RDF |
class based routing, web server security, Linux, UNIX, DDoS, distributed denial of service attacks |
12 | Zhili Zhou, Akshat Gaurav, B. B. Gupta 0001, Hédi Hamdi, Nadia Nedjah |
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. |
Neural Comput. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | J. S. Prasath, V. Irine Shyja, P. Chandrakanth, Boddepalli Kiran Kumar, Adam Raja Basha |
An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system. |
J. Intell. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad |
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Qianru Zhou, Rongzhen Li, Lei Xu 0015, Arumugam Nallanathan, Jian Yang 0003, Anmin Fu |
Towards Interpretable Machine-Learning-Based DDoS Detection. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nisha Ahuja, Debajyoti Mukhopadhyay, Gaurav Singal |
DDoS attack traffic classification in SDN using deep learning. |
Pers. Ubiquitous Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Asha Varma Songa, Ganesh Reddy Karri |
An integrated SDN framework for early detection of DDoS attacks in cloud computing. |
J. Cloud Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Beenish Habib, Farida Khursheed |
Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches. |
Concurr. Comput. Pract. Exp. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Himanshu Setia, Amit Chhabra, Sunil K. Singh 0002, Sudhakar Kumar, Sarita Sharma, Varsha Arya, Brij B. Gupta, Jinsong Wu 0001 |
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments. |
Cyber Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Vikash Kumar Singh, Durga Sivashankar, Kishlay Kundan, Sushmita Kumari |
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR. |
J. Cyber Secur. Mobil. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sripriyanka G, Anand Mahendran |
Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chin-Shiuh Shieh, Fu-An Ho, Mong-Fong Horng, Thanh-Tuan Nguyen, Prasun Chakrabarti |
Open-Set Recognition in Unknown DDoS Attacks Detection With Reciprocal Points Learning. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Makhduma Saiyed, Irfan S. Al-Anbagi |
A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Loay Abdelrazek, Ramin Fuladi, János Kövér, Leyli Karaçay, Utku Gülen |
Detecting IP DDoS Attacks Using 3GPP Radio Protocols. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Joelle Kabdjou, Norihiko Shinomiya |
Improving Quality of Service and HTTPS DDoS Detection in MEC Environment With a Cyber Deception-Based Architecture. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Olufunsho I. Falowo, Jacques Bou Abdo |
2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sandeep Dasari, Rajesh Kaluri |
An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization Techniques. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Olufunsho I. Falowo, Murat Ozer, Chengcheng Li, Jacques Bou Abdo |
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Heyu Wang, Yixuan Li |
Overview of DDoS Attack Detection in Software-Defined Networks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yaser Alhasawi, Salem Alghamdi |
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aleksa N. Maksimovic, Vojkan Nikolic, Dejan Vidojevic, Dragan M. Randelovic, Slavisa M. Djukanovic, Dragan M. Randjelovic |
Using Triple Modular Redundancy for Threshold Determination in DDOS Intrusion Detection Systems. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yi Qing, Xiangyu Liu, Yanhui Du |
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil |
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kiran Kumar Paidipati, Chinnarao Kurangi, J. Uthayakumar, S. Padmanayaki, D. Pradeepa, S. Nithinsha |
Ensemble of deep reinforcement learning with optimization model for DDoS attack detection and classification in cloud based software defined networks. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Suruchi Karnani, Neha Agrawal, Rohit Kumar |
A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jianguo Ren, Qiang Zhi |
An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiang Chen, Hongyan Liu 0001, Qun Huang 0001, Yudong Zhang 0001, Haifeng Zhou, Chunming Wu 0001, Xuan Liu 0006 |
Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions. |
IEEE/ACM Trans. Netw. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair |
DDoS attack detection in smart grid network using reconstructive machine learning models. |
PeerJ Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, Ron Nevo |
Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Ouhssini, Karim Afdel, Elhafed Agherrabi, Mohamed Akouhar, Abdallah Abarda |
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing. |
J. King Saud Univ. Comput. Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Priyanka Verma, Nitesh Bharot, John G. Breslin, Mukta Sharma, Nisha Chaurasia, Ankit Vidyarthi |
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review. |
Trans. Emerg. Telecommun. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ghazaleh Shirvani, Saeid Ghasemshirazi, Mohammad Ali Alipour |
Enhancing IoT Security Against DDoS Attacks through Federated Learning. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Arvin Hekmati, Bhaskar Krishnamachari |
Graph-Based DDoS Attack Detection in IoT Systems with Lossy Network. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ali Alfatemi, Mohamed Rahouti, Ruhul Amin, Sarah ALJamal, Kaiqi Xiong, Yufeng Xin |
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shariq Murtuza, Krishna Asawa |
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation. |
Int. J. Commun. Networks Distributed Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong Nhung-Nguyen, Jamal Hussain, Manohar Naik Sugali |
DDoS attack detection and mitigation using deep neural network in SDN environment. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Roberto Doriguzzi Corin, Domenico Siracusa |
FLAD: Adaptive Federated Learning for DDoS attack detection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Onur Polat, Muammer Türkoglu, Huseyin Polat 0002, Saadin Oyucu, Hüseyin Üzen, Fahri Yardimci, Ahmet Aksöz |
Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fauzia Talpur, Imtiaz Ali Korejo, Aftab Ahmed Chandio, Ali Ghulam, Mir Sajjad Hussain Talpur |
ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Saadin Oyucu, Onur Polat, Muammer Türkoglu, Hüseyin Polat 0002, Ahmet Aksöz, Mehmet Tevfik Agdas |
Ensemble Learning Framework for DDoS Detection in SDN-Based SCADA Systems. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ibtihal AlSaleh, Aida Al-Samawi, Liyth Nissirat |
Novel Machine Learning Approach for DDoS Cloud Detection: Bayesian-Based CNN and Data Fusion Enhancements. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aymene Selamnia, Lyes Khoukhi, Mondher Ayadi, Bouaziz Ahmed |
Securing IIoT Against DDoS attacks: A Stochastic Approach. |
GIIS |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Eric Gamess, Mausam Parajuli |
Image-Processing Workloads and DDoS Attack Resilience: Evaluating Docker and Podman Containers on Raspberry Pi and ODROID. |
ACM Southeast Regional Conference |
2024 |
DBLP DOI BibTeX RDF |
|
12 | K. Rajkumar, Mercy Shalinie Selvaraj, Hamil Stanly |
SDN Defense: Detection and mitigation of DDoS attack via IoT Network. |
ICDCN |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mitali Sinha |
SynFloWatch: A Detection System against TCP-SYN based DDoS Attacks using Entropy in Hybrid SDN. |
ICDCN |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Angelo Feraudo, Diana Andreea Popescu, Poonam Yadav, Richard Mortier, Paolo Bellavista |
Mitigating IoT Botnet DDoS Attacks through MUD and eBPF based Traffic Filtering. |
ICDCN |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Himanshu, Kaushik Saha, Payali Das, Swades De |
A Network Segmentation Architecture for Flow Aggregation and DDoS Mitigation in SDN Using RAPID Flow Rules. |
ICDCN |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Joseph Okonofua, Richard T. Meyer, Shameek Bhattacharjee |
Information Diversity based Detection for ON-OFF Low Strength DDoS Attacks in Smart Home IoT. |
ICDCN |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 2856 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|