has been cited by the following article(s):
[1]
|
DDoSDet: An approach to Detect DDoS attacks using Neural Networks
|
|
arXiv preprint arXiv:2201.09514,
2022 |
|
|
[2]
|
Testing and Comparing the Performances of Windows Server 2022, Ubuntu 20. 04 and CentOS 8 under DDoS Attacks
|
|
2022 |
|
|
[3]
|
Smurf as Spoof Type Attacking Activity on Network and Neutralization
|
|
Journal of Physics …,
2021 |
|
|
[4]
|
The Cyber Security Evaluation of a Wireless and Wired Smart Electric Meter
|
|
2021 |
|
|
[5]
|
DDoS Attack Detection Using Artificial Neural Network
|
|
2021 |
|
|
[6]
|
Cyber Security Evaluation of CentOS Red Hat Based Operating System Under Cyber Attack with Increasing Magnitude
|
|
2020 |
|
|
[7]
|
Can Routers Provide Sufficient Protection against Cyber Security Attacks?
|
|
2019 |
|
|
[8]
|
Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
|
|
2018 |
|
|
[9]
|
Security Evaluation of Virtualized Computing Platforms
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[10]
|
Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions
|
|
Journal of the Korea Industrial Information Systems Research,
2017 |
|
|
[11]
|
Do ICMP Security Attacks Have Same Impact on Servers?
|
|
2017 |
|
|
[12]
|
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
|
|
2016 |
|
|
[13]
|
Impact of virtualization on cloud network security
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[14]
|
Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
|
|
International Journal of Engineering Research and Technology,
2015 |
|
|
[15]
|
Dynamic Security Level Changing Strategy Using Attack Predictions-Case Study of TCP SYN Attacks
|
|
IT Convergence and Security (ICITCS), 2014 International Conference on,
2014 |
|
|
[16]
|
Ambientes Controlados de Geração de Anomalias: Uma Reprodução de Ataques de Negação de Serviço
|
|
WAP Sukeyosi1, EP de Mattos, B Bogaz, LSM Zarpel?o�,
2013 |
|
|
[1]
|
Computing Science, Communication and Security
Communications in Computer and Information Science,
2021
DOI:10.1007/978-3-030-76776-1_4
|
|
|
[2]
|
Smurf as Spoof Type Attacking Activity on Network and Neutralization
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2131/2/022078
|
|
|
[3]
|
Assessment of mechanical properties of fibrous mortar and interlocking soil stabilised block (ISSB) for low-cost masonry housing
Materiales de Construcción,
2019
DOI:10.3989/mc.2019.13418
|
|
|
[4]
|
Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
2018 1st International Conference on Data Intelligence and Security (ICDIS),
2018
DOI:10.1109/ICDIS.2018.00026
|
|
|
[5]
|
Do ICMP Security Attacks Have Same Impact on Servers?
Journal of Information Security,
2017
DOI:10.4236/jis.2017.83018
|
|
|
[6]
|
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
Journal of Information Security,
2016
DOI:10.4236/jis.2016.74018
|
|
|
[7]
|
Dynamic Security Level Changing Strategy Using Attack Predictions - Case Study of TCP SYN Attacks
2014 International Conference on IT Convergence and Security (ICITCS),
2014
DOI:10.1109/ICITCS.2014.7021760
|
|
|