Scientific Research An Academic Publisher
OPEN ACCESS
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack (Articles)
Minmin Xie, Yong Wang, Chunming Zou, Yingjie Tian, Naiwang Guo
Journal of Computer and Communications Vol.8 No.11,November 24, 2020
DOI: 10.4236/jcc.2020.811007 71 Downloads 152 Views Citations
Classification Approach for Intrusion Detection in Vehicle Systems (Articles)
Abdulaziz Alshammari, Mohamed A. Zohdy, Debatosh Debnath, George Corser
Wireless Engineering and Technology Vol.9 No.4,October 31, 2018
DOI: 10.4236/wet.2018.94007 1,567 Downloads 2,904 Views Citations
Can Routers Provide Sufficient Protection against Cyber Security Attacks? (Articles)
David Leal, Sanjeev Kumar
Journal of Information Security Vol.10 No.4,October 31, 2019
DOI: 10.4236/jis.2019.104017 324 Downloads 874 Views Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks (Articles)
Rodolfo Baez Junior, Sanjeev Kumar
Journal of Information Security Vol.5 No.3,July 24, 2014
DOI: 10.4236/jis.2014.53012 4,810 Downloads 6,083 Views Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods (Articles)
Arman Sargolzaei, Kang Yen, Mohamed Abdelghani, Alireza Abbaspour, Saman Sargolzaei
Intelligent Control and Automation Vol.8 No.3,August 23, 2017
DOI: 10.4236/ica.2017.83013 952 Downloads 1,778 Views Citations
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks (Articles)
Sanjeev Kumar, Raja Sekhar Reddy Gade
Journal of Information Security Vol.3 No.2,April 26, 2012
DOI: 10.4236/jis.2012.32015 7,123 Downloads 12,470 Views Citations
Effect of Network Traffic on IPS Performance (Articles)
Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani
DOI: 10.4236/jis.2012.32019 5,574 Downloads 9,314 Views Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs (Articles)
Aziz Baayer, Nourddine Enneya, Mohammed Elkoutbi
Journal of Information Security Vol.3 No.3,July 25, 2012
DOI: 10.4236/jis.2012.33028 4,281 Downloads 7,484 Views Citations
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks (Articles)
Shweta Tripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru
Journal of Information Security Vol.4 No.3,July 16, 2013
DOI: 10.4236/jis.2013.43018 6,710 Downloads 12,307 Views Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network (Articles)
Akinjide A. Akinola, Adeyemi A. Adekoya, Ayoade O. Kuye, Abiodun Ayodeji
Journal of Information Security Vol.10 No.3,June 17, 2019
DOI: 10.4236/jis.2019.103006 446 Downloads 938 Views Citations
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks (Articles)
Yu ZHANG, Xing She ZHOU, Yi Ming JI, Yee Wei LAW, Marimuthu PALANISWAMI
Int'l J. of Communications, Network and System Sciences Vol.2 No.1,February 26, 2009
DOI: 10.4236/ijcns.2009.21008 6,767 Downloads 14,147 Views Citations
Contamination Potential of an Urban Mine Tailings Deposit in Central Mexico—A Preliminary Estimation (Articles)
Liliana Lizárraga-Mendiola, Diana Elizabeth Ángeles-Chávez, Alberto Blanco-Piñón, Màrius Ramírez-Cardona, Francisco Javier Olguín-Coca, María del Refugio González-Sandoval
International Journal of Geosciences Vol.5 No.3,March 27, 2014
DOI: 10.4236/ijg.2014.53030 4,554 Downloads 6,255 Views Citations
A Code Correlation Comparison of the DOS and CP/M Operating Systems (Articles)
Robert Zeidman
Journal of Software Engineering and Applications Vol.7 No.6,May 28, 2014
DOI: 10.4236/jsea.2014.76048 6,693 Downloads 8,923 Views Citations This article belongs to the Special Issue on Software Analysis and Testing
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack (Articles)
Hyun Woo Lee, Tae Ho Cho
Wireless Sensor Network Vol.4 No.8,August 29, 2012
DOI: 10.4236/wsn.2012.48027 4,107 Downloads 5,946 Views Citations
A Novel Solution to Handle DDOS Attack in MANET (Articles)
Meghna Chhabra, Brij Gupta, Ammar Almomani
DOI: 10.4236/jis.2013.43019 6,206 Downloads 10,511 Views Citations
Public Key Infrastructure: A Survey (Articles)
Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
Journal of Information Security Vol.6 No.1,January 8, 2015
DOI: 10.4236/jis.2015.61004 4,107 Downloads 6,182 Views Citations
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks (Articles)
Vennam Ratna Kumari, Aitha Nagaraju, Gaurav Pareek
Journal of Sensor Technology Vol.4 No.2,May 21, 2014
DOI: 10.4236/jst.2014.42006 3,667 Downloads 4,807 Views Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment (Articles)
Sanjeev Kumar, Orifiel Gomez
Journal of Information Security Vol.1 No.2,October 29, 2010
DOI: 10.4236/jis.2010.12010 9,405 Downloads 17,597 Views Citations
Research on the Active DDoS Filtering Algorithm Based on IP Flow (Articles)
Rui GUO, Hao YIN, Dongqi WANG, Bencheng ZHANG
Int'l J. of Communications, Network and System Sciences Vol.2 No.7,October 20, 2009
DOI: 10.4236/ijcns.2009.27067 6,119 Downloads 10,634 Views Citations
Match Analysis in a University Taekwondo Championship (Articles)
Coral Falco, Raul Landeo, Cristina Menescardi, José Luis Bermejo, Isaac Estevan
Advances in Physical Education Vol.2 No.1,February 16, 2012
DOI: 10.4236/ape.2012.21005 6,321 Downloads 14,511 Views Citations