Similar Items
Introduction: Locating Spectres
by: Lee, Christina
Published: (2017)
by: Lee, Christina
Published: (2017)
Hauntology and spectres of personal trauma in Ruskin Bond’s “Topaz” and “The Woman on Platform No. 8”
by: Priyank Jain,, et al.
Published: (2024)
by: Priyank Jain,, et al.
Published: (2024)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Mitigation Of Syn-Flooding Attack Using High Speed Programmable Network Processor
by: Lim, Boon Ping
Published: (2006)
by: Lim, Boon Ping
Published: (2006)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Detecting and mitigating botnet attacks using deep
learning in software-defined networks
by: Muhammad Waqas, Nadeem
Published: (2023)
by: Muhammad Waqas, Nadeem
Published: (2023)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
Mitigation of corrosion attack on carbon steel coated cermet alloy in different anion contents
by: Mohd Khalid, Muhamad Azrin, et al.
Published: (2017)
by: Mohd Khalid, Muhamad Azrin, et al.
Published: (2017)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Voltage sags mitigation techniques analysis
by: Saudin, Norshafinash
Published: (2007)
by: Saudin, Norshafinash
Published: (2007)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Reliability analysis of engineered landslide mitigation techniques
by: Qasim, S., et al.
Published: (2010)
by: Qasim, S., et al.
Published: (2010)
Risk mitigation techniques in agile development processes
by: Rafeek, Muhammad Akil, et al.
Published: (2019)
by: Rafeek, Muhammad Akil, et al.
Published: (2019)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014)
by: Ahmad, Zaid
Published: (2014)
An efficient modulation technique to mitigate
nonlinearities in optical OFDM
by: Rahman, Muhammad Towfiqur, et al.
Published: (2014)
by: Rahman, Muhammad Towfiqur, et al.
Published: (2014)
Interference Mitigation Technique Through Shielding and Antenna Discrimination
by: Abdulrazak, Lway Faisal, et al.
Published: (2015)
by: Abdulrazak, Lway Faisal, et al.
Published: (2015)
Blackouts mitigation of power system using fuzzy technique
by: Siti Nur Ain, Abdul Kadir
Published: (2012)
by: Siti Nur Ain, Abdul Kadir
Published: (2012)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Mitigation technique for rain fade using frequency diversity method
by: Kesavan, Ulaganathen, et al.
Published: (2016)
by: Kesavan, Ulaganathen, et al.
Published: (2016)
Interference in Wireless Networks: Causes, Analyses and Practical Mitigating Techniques
by: Oudah, Ali A., et al.
Published: (2014)
by: Oudah, Ali A., et al.
Published: (2014)
Similar Items
-
Introduction: Locating Spectres
by: Lee, Christina
Published: (2017) -
Hauntology and spectres of personal trauma in Ruskin Bond’s “Topaz” and “The Woman on Platform No. 8”
by: Priyank Jain,, et al.
Published: (2024) -
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017) -
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)