咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 18 篇 ddos attack
  • 3 篇 blockchain
  • 3 篇 network security
  • 3 篇 sdn
  • 2 篇 smart homes
  • 2 篇 authentication
  • 2 篇 device-to-device
  • 1 篇 drdos
  • 1 篇 internet of thin...
  • 1 篇 decentralized cr...
  • 1 篇 graph neural net...
  • 1 篇 tcp syn flood
  • 1 篇 malicious user i...
  • 1 篇 arima
  • 1 篇 suspicious user ...
  • 1 篇 data privacy
  • 1 篇 botnet
  • 1 篇 smart gateway
  • 1 篇 decentralized tr...
  • 1 篇 lstm

机构

  • 2 篇 faculty of engin...
  • 2 篇 school of inform...
  • 2 篇 faculty of compu...
  • 1 篇 hainan huochain ...
  • 1 篇 australian insti...
  • 1 篇 national center ...
  • 1 篇 college of scien...
  • 1 篇 federal universi...
  • 1 篇 school of electr...
  • 1 篇 department of ma...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 guangxi key labo...
  • 1 篇 institute of tel...
  • 1 篇 faculty of compu...
  • 1 篇 heilongjiang key...
  • 1 篇 department of el...
  • 1 篇 cloud computing ...
  • 1 篇 department of el...
  • 1 篇 institute for ne...

作者

  • 3 篇 jieren cheng
  • 2 篇 kashif nisar
  • 2 篇 bhawani shankar ...
  • 2 篇 saw chin tan
  • 2 篇 rajkumar buyya
  • 2 篇 muhammad reazul ...
  • 2 篇 rizaludin kaspin
  • 2 篇 xiangyan tang
  • 2 篇 satya prasad maj...
  • 2 篇 canting cai
  • 2 篇 zulfadzli yusoff
  • 1 篇 yang qiliang
  • 1 篇 tariq ahamed aha...
  • 1 篇 yu yong
  • 1 篇 gwanggil jeon
  • 1 篇 muhammad aslamuq...
  • 1 篇 rula halaseh
  • 1 篇 zhang yefei
  • 1 篇 abdulaziz aldaej
  • 1 篇 wenbing yao

语言

  • 18 篇 英文
检索条件"主题词=DDoS Attack"
18 条 记 录,以下是1-10 订阅
排序:
Blockchain-based ddos attack mitigation protocol for device-to-device interaction in smart home
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 383-392页
作者: Bello Musa Yakubu Majid Iqbal Khan Abid Khan Farhana Jabeen Gwanggil Jeon Department of Mathematics and Computer Science Chulalongkorn UniversityBangkok10330Thailand Department of Computer Science COMSATS University Islamabad(CUI)Islamabad45550Pakistan College of Science and Engineering University of DerbyDerbyDE221GBUnited Kingdom Department of Embedded Systems Engineering Incheon National UniversityIncheon22012South Korea
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(ddos))in a network(e.g.,Smart hom... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Unprecedented Smart Algorithm for Uninterrupted SDN Services During ddos attack
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 875-894页
作者: Muhammad Reazul Haque Saw Chin Tan Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.P.C.Rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya Prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya Faculty of Computing&Informatics Multimedia UniversityPersiaranMultimediaCyberjaya63100SelangorMalaysia Faculty of Engineering Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Faculty of Computing and Informatics University Malaysia SabahJalan UMSKota Kinabalu Sabah88400Malaysia Telekom Malaysia Research&Development TM Innovation Centre63000CyberjayaSelangorMalaysia Federal University of Piauí(UFPI) TeresinaPIBrazil Instituto de Telecomunica珲es 6201-001Covilh?Portugal National Center of Robotics and Automation-Condition Monitoring Systems Lab MUETJamshoroPakistan Department of Electrical and Electronic Engineering BUETDhaka1205Bangladesh Department of Electrical Engineering and Computer Science Data Science and Cybersecurity CenterHoward UniversityWashingtonDCUSA Cloud Computing and Distributed Systems(CLOUDS)Laboratory School of Computing and Information SystemsThe University of MelbourneMelbourneVIC 3053Australia
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A ddos attack Information Fusion Method Based on CNN for Multi-Element Data
收藏 引用
Computers, Materials & Continua 2020年 第4期63卷 131-150页
作者: Jieren Cheng Canting Cai Xiangyan Tang Victor SSheng Wei Guo Mengyang Li School of Information Science and Technology Hainan UniversityHaikou570228China Key Laboratory of Internet Information Retrieval of Hainan Province Hainan UniversityHaikou570228China Department of Computer Science University of Central ArkansasConwayAR 72035US
Traditional distributed denial of service(ddos)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm *** order to solve the proble... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ddos attack Detection Method for Space-Based Network Based on SDN Architecture
收藏 引用
ZTE Communications 2020年 第4期18卷 18-25页
作者: JIA Min SHU Yuejie GUO Qing GAO Zihe XIE Suofei Communication Research Center School of Electronics and Information EngineeringHarbin Institute of TechnologyHarbin 150006China Institute of Telecommunication Satellite China Academy of Space TechnologyBeijing 100094China
With the development of satellite communications,the number of satellite nodes is constantly increasing,which undoubtedly increases the difficulty of maintaining network *** software defined network(SDN) with traditio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under ddos Security attack
收藏 引用
Journal of Information Security 2016年 第4期7卷 225-231页
作者: Koushicaa Sundar Sanjeev Kumar Department of Electrical and Computer Engineering The University of Texas—RGV Edinburg Texas USA
Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (ddos) attacks. In this paper, we presented re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Automated Controller Placement for Software-Defined Networks to Resist ddos attacks
收藏 引用
Computers, Materials & Continua 2021年 第9期68卷 3147-3165页
作者: Muhammad Reazul Haque Saw Chin Tan Zulfadzli Yusoff Kashif Nisar Lee Ching Kwang Rizaludin Kaspin Bhawani Shankar Chowdhry Rajkumar Buyya Satya Prasad Majumder Manoj Gupta Shuaib Memon Faculty of Computing&Informatics Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Faculty of Engineering Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Faculty of Computing and Informatics University Malaysia SabahJalan UMSKota Kinabalu Sabah88400Malaysia Telekom Malaysia Research&Development TM Innovation CentreCyberjaya63000SelangorMalaysia National Center of Robotics and Automation Mehran University of Engineering&TechnologyJamshoroPakistan Department of Computer Science and Engineering Hanyang UniversitySeoul04763South Korea School of Electrical and Electronic Engineering Nanyang Technological University639798Singapore Cloud Computing and Distributed Systems Laboratory The University of MelbourneMelbourneVIC 3053Australia Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology(BUET)Dhaka1205Bangladesh Department of Electronics and Communication Engineering JECRC UniversityVidhaniJaipur303905India Auckland Institute of Studies Mt AlbertAucklandNew Zealand
In software-defined networks(SDNs),controller placement is a critical factor in the design and planning for the future Internet of Things(IoT),telecommunication,and satellite communication *** research has concentrate... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cooperative Detection Method for ddos attacks Based on Blockchain
收藏 引用
Computer Systems Science & Engineering 2022年 第10期43卷 103-117页
作者: Jieren Cheng Xinzhi Yao Hui Li Hao Lu Naixue Xiong Ping Luo Le Liu Hao Guo Wen Feng Hainan University Haikou570228China Hainan Blockchain Technology Engineering Research Center Haikou570228China Hainan Huochain Tech Company Limited Haikou570100China Research Office of Information Technology Air Force Early Warning AcademyWuhan430019China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
Distributed Denial of Service(ddos)attacks is always one of the major problems for service *** blockchain to detect ddos attacks is one of the current popular ***,the problems of high time overhead and cost exist in t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Entropy-Based Approach to Detect ddos attacks on Software Defined Networking Controller
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 373-391页
作者: Mohammad Aladaileh Mohammed Anbar Iznan H.Hasbullah Yousef K.Sanjalawe Yung-Wey Chong National Advanced IPv6 Centre of Excellence Universiti Sains MalaysiaPenangMalaysia Department of Computer Sciences Northern Border UniversityAr’arKingdom of Saudi Arabia
The Software-Defined Networking(SDN)technology improves network management over existing technology via centralized network *** SDN provides a perfect platform for researchers to solve traditional network’s outstandi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Abnormal Network Flow Feature Sequence Prediction Approach for ddos attacks Detection in Big Data Environment
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 95-119页
作者: Jieren Cheng Ruomeng Xu Xiangyan Tang Victor S.Sheng Canting Cai School of Information Science and Technology Hainan University570228HaikouChina State Key Laboratory of Marine Resource Utilization in South China Sea 570228HaikouChina Department of Computer Science University of Central ArkansasConwayAR 72035USA
Distributed denial-of-service(ddos)is a rapidly growing problem with the fast development of the *** are multitude ddos detection approaches,however,three major problems about ddos attack detection appear in the big d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Towards real-time ML-based ddos detection via cost-efficient window-based feature extraction
收藏 引用
Science China(Information Sciences) 2023年 第5期66卷 114-129页
作者: Haibin LI Yi ZHAO Wenbing YAO Ke XU Qi LI Department of Computer Science and Technology Tsinghua University Beijing National Research Center for Information Science and Technology (BNRist) Institute for Network Sciences and Cyberspace Tsinghua University
Distributed denial of service(ddos) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论