The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase MS-DOS (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1967-1980 (16) 1981-1986 (17) 1987-1988 (23) 1989-1990 (29) 1991-1992 (23) 1993 (20) 1994 (22) 1995 (15) 1996 (25) 1997 (28) 1998 (34) 1999 (32) 2000 (38) 2001 (61) 2002 (87) 2003 (106) 2004 (191) 2005 (208) 2006 (231) 2007 (271) 2008 (316) 2009 (289) 2010 (270) 2011 (319) 2012 (355) 2013 (353) 2014 (425) 2015 (478) 2016 (443) 2017 (544) 2018 (537) 2019 (755) 2020 (815) 2021 (827) 2022 (883) 2023 (888) 2024 (204)
Publication types (Num. hits)
article(3703) book(17) data(8) incollection(38) inproceedings(5996) phdthesis(382) proceedings(34)
Venues (Conferences, Journals, ...)
CoRR(516) GEOINFO(232) IEEE Access(126) Sensors(119) SBSI(111) IHC(91) Remote. Sens.(76) Revista Brasileira de Informá...(73) SIBGRAPI(67) IGARSS(66) WebMedia(64) Expert Syst. Appl.(59) SBQS(57) SAC(53) SVR(51) IJCNN(50) More (+10 of total 2457)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1332 occurrences of 792 keywords

Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Lubomir Salanci Object-Oriented Programming at Upper Secondary School for Advanced Students. Search on Bibsonomy ISSEP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18 Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia Practical Broadcast Authentication in Sensor Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Basheer Al-Duwairi, G. Manimaran Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jeonil Kang, DaeHun Nyang RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
18RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hidetoshi Ueno, Hideharu Suzuki, Norihiro Ishikawa A Group Management Protocol for Mobile Multicast. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 SVision: A Network Host-Centered Anomaly Visualization Technique. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song FIT: fast Internet traceback. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Seonho Choi Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Erol Gelenbe Users and Services in Intelligent Networks. Search on Bibsonomy AINTEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18B. Saillet, Jean-Michel Portal, Didier Née Flash Memory Cell: Parametric Test Data Reconstruction for Process Monitoring. Search on Bibsonomy DFT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Salil S. Kanhere, Anjum Naveed A Novel Tuneable Low-Intensity Adversarial Attack. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro On the Use of Traffic Monitoring and Measurements for Improving Networking. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Angelos D. Keromytis, Vishal Misra, Dan Rubenstein SOS: an architecture for mitigating DDoS attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Basheer Al-Duwairi, Anirban Chakrabarti, Govindarasu Manimaran An Efficient Probabilistic Packet Marking Scheme for IP Traceback. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Guang Yang 0001, Mario Gerla, M. Y. Sanadidi Defense against low-rate TCP-targeted denial-of-service attacks. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Bao-Tung Wang, Henning Schulzrinne A denial-of-service-resistant IP traceback approach. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang Channel surfing and spatial retreats: defenses against wireless denial of service. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, Jamming, CSMA
18Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
18Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ajmal S. Mian, Ashraf Masood Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, scalability, denial of service
18Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu On the Issues of IP Traceback for IPv6 and Mobile IPv6. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Zhaole Chen, Moon-Chuen Lee An IP Traceback Technique against Denial-of-Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Cristian Estan, George Varghese, Mike Fisk Counting the number of active flows on a high speed link. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Hechmi Khlifi, Jocelyn Desbiens, Mohamed Cheriet Building Groupwares over Duplicated Object Systems. Search on Bibsonomy CRIWG The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née An Automated Design Methodology for EEPROM Cell (ADE). Search on Bibsonomy MTDT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née An Automated Methodology to Diagnose Geometric Defect in the EEPROM Cell. Search on Bibsonomy ITC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Kenjiro Cho, Ryo Kaizaki, Akira Kato Aguri: An Aggregation-Based Traffic Profiler. Search on Bibsonomy QofIS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Akihiko Miyoshi, Ragunathan Rajkumar Protecting Resources with Resource Control Lists. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Martin Barghoorn High performance computing through parallel processing. Search on Bibsonomy APL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF APL
18Jeffrey Horton, Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Friedrich Summann Das Internet-basierte Bibliotheksinformationssystem in der Bibliothek der Universität Bielefeld. Search on Bibsonomy Inform. Forsch. Entwickl. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Informationsnetz, bibliographische Datenbanken, Dokumentlieferung, digitale Bibliothek
18James Thatcher Screen reader/2: access to OS/2 and the graphical user interface. Search on Bibsonomy ASSETS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF OS/2
18Randy F. Pausch, Matthew Conway, Robert DeLine Lessons Learned from SUIT, the Simple User Interface Toolkit. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF SUIT, GUI, graphical user interface, software tools, pedagogy, rapid prototyping, portability, UIMS, learnability, user interface toolkit, export
18James G. Wheeler Design and Implementation of the Interface to Compiled Languages in APL*PLUS II. Search on Bibsonomy APL The full citation details ... 1990 DBLP  DOI  BibTeX  RDF APL
18A. H. Jarvis, D. Pratt, Keith E. Gatling The effect of unstaffing. Search on Bibsonomy SIGUCCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
17Diomidis Spinellis Trace: A Tool for Logging Operating System Call Transactions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF MS-DOS
17M. Stella Atkins, Louis J. Hafer, Patrick Leung Robots in the laboratory. Search on Bibsonomy SIGCSE The full citation details ... 1988 DBLP  DOI  BibTeX  RDF IBM PC, MS-DOS
16Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach
16Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF denial-of-service (DoS) attack, spoofed reader attack, authentication, access control, RFID security
16Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Application DoS, network security, group testing
16Mehran S. Fallah A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Client-puzzle approach, flooding DoS attack, reliability, game theory, availability and serviceability
16Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility
16Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane Fault Injection Resilience. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Fault Injection Attack (FIA), symmetric block encryption, Fault Injection Resilience (FIR), Differential Fault Analysis (DFA), Dual-rail with Precharge Logic (DPL), Side-Channel Attack (SCA), Denial of Service (DoS)
16Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han A Novel Cross Layer Intrusion Detection System in MANET. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANET, IDS, DoS, Cross layer, AODV
16Hakem Beitollahi, Geert Deconinck Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Empirical study, overlay networks, DoS attacks
16Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
16Jayashree Padmanabhan, K. S. Easwarakumar Traffic Engineering Based Attack Detection in Active Networks. Search on Bibsonomy ICDCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Denial of Service (DoS), active network, traffic characteristics, leaky buckets
16Sushil Kumar Jain, Kumkum Garg A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Jamming Attack, Denial of Service (DoS), Multipath Routing
16Siqin Zhao, Kang Chen, Weimin Zheng Defend Against Denial of Service Attack with VMM. Search on Bibsonomy GCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Isolated Environment, Selective Duplication, Threshold, Virtual Machine Monitor, DoS Attack
16Man Ho Au, Willy Susilo, Yi Mu 0001 Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA
16Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of RFID Security Method with Ownership Transfer. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack
16Meiko Jensen, Nils Gruschka, Norbert Luttenberger The Impact of Flooding Attacks on Network-based Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, availability, DoS, attacks, flooding
16Danny Wong Kickin' it old school!: dealing with legacy applications. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Virtualization, Linux, DOS, VMware, cross-platform, Legacy
16Ana Emília de Melo Queiroz, Maurício Motta Braga, Alex Sandro Gomes Design de ajudas inteligentes em interfaces educativas. Search on Bibsonomy IHC The full citation details ... 2008 DBLP  BibTeX  RDF análise instrumental da aprendizagem, interfaces educativas, teoria dos campos conceituais, scaffolding
16Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
16Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
16Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt Wireless client puzzles in IEEE 802.11 networks: security by wireless. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-service (DoS), wireless security, impersonation attacks, client puzzles
16Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack
16Virginia N. L. Franqueira, Raul H. C. Lopes Vulnerability Assessment by Learning Attack Specifications in Graphs. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Security, DoS, Intrusion Prevention
16Hung-Yu Chien, Chen-Wei Huang A Lightweight RFID Protocol Using Substring. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-cost cryptography, DOS attack, authentication, RFID, tracing, reader
16Dmitrij Lagutin, Hannu H. Kari Controlling Incoming Connections Using Certificates and Distributed Hash Tables. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rights delegation, DoS countermeasures, certificates, Session management, rights management
16Mikhael Felker Internet War Games: Power of the Masses. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defense methods, distributed DoS attacks, denial-of-service attacks
16Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker DDoS defense by offense. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bandwidth, DoS attack, currency
16Udaya Kiran Tupakula, Vijay Varadharajan Analysis of traceback techniques. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF DoS, denial of service, DDoS, traceback
16Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer Single-packet IP traceback. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network fault diagnosis, IP, denial of service (DoS), wide-area networks (WANs), computer network management, IP traceback, computer network security
16Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
16Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura Design and Implementation of Unauthorized Access Tracing System. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, IDS, traceback, unauthorized access, DOS
16Cristina Cifuentes An Environment for the Reverse Engineering of Executable Programs. Search on Bibsonomy APSEC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF reverse compiler, i80286, reverse engineering, signatures, C language, disassembler, dos
16Catherine C. Bareiss An introductory course on the use of operating systems. Search on Bibsonomy SIGCSE The full citation details ... 1992 DBLP  DOI  BibTeX  RDF UNIX, DOS
16Allison J. Mull, P. Tobin Maginnis Evolutionary Steps Toward a Distributed Operating System: Theory and Implementation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF MINIX, DOS
16Paul Reince Hard disk management standards in a networked environment. Search on Bibsonomy SIGUCCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF DOS
12Merly Thomas, B. B. Meshram DoS attack detection using Aquila deer hunting optimization enabled deep belief network. Search on Bibsonomy Int. J. Web Inf. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yong Ma 0002, Xin Qi, Zhixiong Li, Songlin Hu, Miguel Ángel Sotelo Resilient Control for Networked Unmanned Surface Vehicles With Dynamic Event-Triggered Mechanism Under Aperiodic DoS Attacks. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sifan Li, Yue Cao 0002, Shuohan Liu, Yuping Lai, Yongdong Zhu, Naveed Ahmad 0003 HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yuan-Yuan Li, Yuan-Xin Li 0001 Security-based distributed fuzzy funnel cooperative control for uncertain nonlinear multi-agent systems against DoS attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ling Chen, Guanqi Wang, Feng Li 0009 H∞ Filtering for Discrete-Time Singular Markov Jump Systems Under DoS Attacks and Its Application. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xiaohua Zhang, Huaxiang Han Event-Triggered Finite-Time Filtering for Nonlinear Networked System With Quantization and DOS Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Liyuan Yin, Lezhong Xu, Fusheng Hou, Hongming Zhu, Houhua Jing, Xingjian Sun, Chengwei Wu Security Analysis and Control Under Periodic DoS Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Palanisamy Selvaraj, Oh-Min Kwon 0001, Seung-Hoon Lee, R. Sakthivel 0001, S. M. Lee Event-triggered control design with varying gains for polynomial fuzzy systems against DoS attacks. Search on Bibsonomy Math. Comput. Simul. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yifan Zhong, Yuan Yuan 0006, Huanhuan Yuan Nash Equilibrium Seeking for Multi-Agent Systems Under DoS Attacks and Disturbances. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Tohid Behdadnia, Klaas Thoelen, Fairouz Zobiri, Geert Deconinck Leveraging Deep Learning to Increase the Success Rate of DoS Attacks in PMU-Based Automatic Generation Control Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Da-Wei Zhang, Guo-Ping Liu 0003 Secure Predictive Control for Networked High-Order Fully Actuated Systems Under Random DoS Attacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Lusong Ding, Weiwei Sun 0004 Neuroadaptive prescribed-time secure control for nonlinear interconnected NCSs via multiple triggering against DoS attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Shenshen Li, Haibo Du, Weile Chen, Wenwu Zhu 0004 Design of non-smooth consensus protocol for multi-agent systems under DoS attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ming-Juan Guo, Yuan-Xin Li 0001 Estimator-based adaptive prescribed performance cooperative bipartite containment control of nonlinear multiagent system against DoS attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xinyu Guan, Yanyan Hu, Kaixiang Peng Finite-time switching-like sliding mode fault-tolerant control for discrete-time cyber-physical systems under DoS attacks and intermittent faults. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Chenhang Yan, Liping Yan, Yuezu Lv, Yuanqing Xia Adaptive Event-Triggered Resilient Control of Heterogeneous Multiagent Under DoS Attacks and Link Faults on Directed Graphs. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Lili Li, Di Rong, Jun Fu 0001, Qingjun Guo Multi-Level Event-Triggered Scheme of Output Regulation Under Long-Duration DoS Attacks in Switched Systems With Dissipativity. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jinliang Liu, Yanhui Dong, Zhou Gu, Xiangpeng Xie, Engang Tian Security consensus control for multi-agent systems under DoS attacks via reinforcement learning method. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai Inherent attack tolerance properties of model predictive control under DoS attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 10178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license