[1]
|
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic
Neural Computing and Applications,
2024
DOI:10.1007/s00521-021-06389-6
|
|
|
[2]
|
DDoS Attack Detection Through Digital Twin Technique in Metaverse
2023 IEEE International Conference on Consumer Electronics (ICCE),
2023
DOI:10.1109/ICCE56470.2023.10043433
|
|
|
[3]
|
Detecting and Mitigating Wormhole Attack Effect in MANETs Based on Hop Count Technique
2023 5th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE),
2023
DOI:10.1109/REEPE57272.2023.10086929
|
|
|
[4]
|
Detecting and Mitigating Wormhole Attack Effect in MANETs Based on Hop Count Technique
2023 5th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE),
2023
DOI:10.1109/REEPE57272.2023.10086929
|
|
|
[5]
|
Secure routing protocol comparison analysis between RNBR with TMR and face
COMPUTATIONAL INTELLIGENCE AND NETWORK SECURITY,
2023
DOI:10.1063/5.0129257
|
|
|
[6]
|
Software-driven secure framework for mobile healthcare applications in IoMT
Intelligent Decision Technologies,
2023
DOI:10.3233/IDT-220132
|
|
|
[7]
|
Deep reinforcement learning for optimal denial-of-service attacks scheduling
Science China Information Sciences,
2022
DOI:10.1007/s11432-020-3027-0
|
|
|
[8]
|
Deep reinforcement learning for optimal denial-of-service attacks scheduling
Science China Information Sciences,
2022
DOI:10.1007/s11432-020-3027-0
|
|
|
[9]
|
A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs
Technological Forecasting and Social Change,
2022
DOI:10.1016/j.techfore.2022.121554
|
|
|
[10]
|
Cyber Security, Privacy and Networking
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-981-16-8664-1_16
|
|
|
[11]
|
Security and Privacy Preserving for IoT and 5G Networks
Studies in Big Data,
2022
DOI:10.1007/978-3-030-85428-7_9
|
|
|
[12]
|
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms
International Journal on Semantic Web and Information Systems,
2022
DOI:10.4018/IJSWIS.297143
|
|
|
[13]
|
Security and Privacy Preserving for IoT and 5G Networks
Studies in Big Data,
2022
DOI:10.1007/978-3-030-85428-7_11
|
|
|
[14]
|
Software-driven secure framework for mobile healthcare applications in IoMT
Intelligent Decision Technologies,
2022
DOI:10.3233/IDT-220132
|
|
|
[15]
|
Software-driven secure framework for mobile healthcare applications in IoMT
Intelligent Decision Technologies,
2022
DOI:10.3233/IDT-220132
|
|
|
[16]
|
A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs
Technological Forecasting and Social Change,
2022
DOI:10.1016/j.techfore.2022.121554
|
|
|
[17]
|
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms
International Journal on Semantic Web and Information Systems,
2022
DOI:10.4018/IJSWIS.297143
|
|
|
[18]
|
Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment
Intelligent Automation & Soft Computing,
2022
DOI:10.32604/iasc.2022.023771
|
|
|
[19]
|
A Systematic Survey on Various Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (WSN)
2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE),
2022
DOI:10.1109/ICRAIE56454.2022.10054309
|
|
|
[20]
|
Advances in Malware and Data-Driven Network Security
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-7789-9.ch012
|
|
|
[21]
|
Advances in Malware and Data-Driven Network Security
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-7789-9.ch009
|
|
|
[22]
|
Advances in Malware and Data-Driven Network Security
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-7789-9.ch002
|
|
|
[23]
|
Advances in Malware and Data-Driven Network Security
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-7789-9.ch003
|
|
|
[24]
|
Advances in Malware and Data-Driven Network Security
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-7789-9.ch004
|
|
|
[25]
|
A Systematic Survey on Various Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (WSN)
2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE),
2022
DOI:10.1109/ICRAIE56454.2022.10054309
|
|
|
[26]
|
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
2021 IEEE International Conference on Communications Workshops (ICC Workshops),
2021
DOI:10.1109/ICCWorkshops50388.2021.9473886
|
|
|
[27]
|
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
2021 IEEE 10th Global Conference on Consumer Electronics (GCCE),
2021
DOI:10.1109/GCCE53005.2021.9622091
|
|
|
[28]
|
CNA Tactics and Techniques: A Structure Proposal
Journal of Sensor and Actuator Networks,
2021
DOI:10.3390/jsan10010014
|
|
|
[29]
|
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic
Neural Computing and Applications,
2021
DOI:10.1007/s00521-021-06389-6
|
|
|
[30]
|
Research Anthology on Combating Denial-of-Service Attacks
2021
DOI:10.4018/978-1-7998-5348-0.ch022
|
|
|
[31]
|
Cyber Warfare and Terrorism
2020
DOI:10.4018/978-1-7998-2466-4.ch068
|
|
|
[32]
|
Handbook of Research on Intrusion Detection Systems
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-7998-2242-4.ch015
|
|
|
[33]
|
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Enterprise Information Systems,
2020
DOI:10.1080/17517575.2020.1712742
|
|
|
[34]
|
A Survey on Security in VANETs
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA),
2020
DOI:10.1109/ICIRCA48905.2020.9182823
|
|
|
[35]
|
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack
Mobile Networks and Applications,
2020
DOI:10.1007/s11036-020-01665-6
|
|
|
[36]
|
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
International Journal of E-Services and Mobile Applications,
2020
DOI:10.4018/IJESMA.2020070104
|
|
|
[37]
|
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
Journal of Information Technology Research,
2020
DOI:10.4018/JITR.2020010110
|
|
|
[38]
|
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Enterprise Information Systems,
2020
DOI:10.1080/17517575.2020.1712742
|
|
|
[39]
|
Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2950820
|
|
|
[40]
|
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
International Journal of E-Services and Mobile Applications,
2018
DOI:10.4018/IJESMA.2018040104
|
|
|
[41]
|
A Review on Information Security Program Development and Management
2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
2018
DOI:10.1109/ICCIC.2018.8782304
|
|
|
[42]
|
Security in Internet of Things: issues, challenges, taxonomy, and architecture
Telecommunication Systems,
2017
DOI:10.1007/s11235-017-0345-9
|
|
|
[43]
|
Risks and Security of Internet and Systems
Lecture Notes in Computer Science,
2016
DOI:10.1007/978-3-319-31811-0_18
|
|
|
[44]
|
A modified algorithm to improve security and performance of AODV protocol against black hole attack
Wireless Networks,
2016
DOI:10.1007/s11276-015-1032-y
|
|
|
[45]
|
Fighting against phishing attacks: state of the art and future challenges
Neural Computing and Applications,
2016
DOI:10.1007/s00521-016-2275-y
|
|
|
[46]
|
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
Neural Computing and Applications,
2016
DOI:10.1007/s00521-016-2317-5
|
|
|
[47]
|
Improved EAACK scheme for detection and isolation of a malicious node in MANET
2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT),
2015
DOI:10.1109/ICATCCT.2015.7456941
|
|
|
[48]
|
A survey of the mitigation methods against DoS attacks on MANETs
2014 Science and Information Conference,
2014
DOI:10.1109/SAI.2014.6918239
|
|
|