Entity-based Parameterization for Distinguishing Distributed Denial of Service from Flash Events
| Format: | Restricted Document |
|---|
Similar Items
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
by: Ahmed Khalaf, Bashar
Published: (2019)
by: Ahmed Khalaf, Bashar
Published: (2019)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
On discrete event simulation of time-variance defense mechanism against low-rate denial of service
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Practical Models To Distinguish Between Seismic Events And Blast Signals
by: Shirani Faradonbeh, Roohollah, et al.
Published: (2023)
by: Shirani Faradonbeh, Roohollah, et al.
Published: (2023)
Parameterization of nice polynomials
by: Anton, Hozjee
Published: (2018)
by: Anton, Hozjee
Published: (2018)
A Hellinger Distance Based Algorithm To Detect Distributed Denial Of Service Attacks On Voice Over Internet Protocol Environments
by: ., Narayanan Sambath
Published: (2017)
by: ., Narayanan Sambath
Published: (2017)
Cloud denial of service detection by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Lattice structural analysis on sniffing to denial of service attacks
by: B., Prabadevi, et al.
Published: (2019)
by: B., Prabadevi, et al.
Published: (2019)
Denial of Service Mitigation Using Nat Load Balancing
by: Lee, Zhi Jiang
Published: (2017)
by: Lee, Zhi Jiang
Published: (2017)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Application of artificial intelligence in distinguishing genuine microseismic events from the noise signals in underground mines
by: Shirani Faradonbeh, Roohollah, et al.
Published: (2024)
by: Shirani Faradonbeh, Roohollah, et al.
Published: (2024)
Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods
by: Ali, Basheer Husham, et al.
Published: (2021)
by: Ali, Basheer Husham, et al.
Published: (2021)
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
by: Izaddoost, Alireza
Published: (2008)
by: Izaddoost, Alireza
Published: (2008)
Controller design based on Q-Parameterization method
by: Mohamad, Hussein Suleiman
Published: (2007)
by: Mohamad, Hussein Suleiman
Published: (2007)
Parameterizations for ensemble Kalman inversion
by: Chada, Neil, et al.
Published: (2018)
by: Chada, Neil, et al.
Published: (2018)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Distinguishing organizational communication
by: Mahmoud M. Galander,
Published: (1999)
by: Mahmoud M. Galander,
Published: (1999)
Detection of different types of distributed denial of service attacks using multiple features of entropy and sequential probabilities ratio test
by: Ali, Basheer Husham, et al.
Published: (2023)
by: Ali, Basheer Husham, et al.
Published: (2023)
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019)
by: Ahmad, Azuan, et al.
Published: (2019)
ATO calls time on distributions to tax-exempt entities
by: Hodgson, Helen
Published: (2016)
by: Hodgson, Helen
Published: (2016)
Extended distributed prototypical for biomedical named entity recognition
by: Maan Tareq Abd,, et al.
Published: (2017)
by: Maan Tareq Abd,, et al.
Published: (2017)
Parameterization of elastic stress sensitivity in shales
by: Pervukhina, M., et al.
Published: (2011)
by: Pervukhina, M., et al.
Published: (2011)
On combining neighbouring extremals with control parameterization
by: Liu, C., et al.
Published: (2015)
by: Liu, C., et al.
Published: (2015)
A hybrid parameterization method for NURBS
by: Shamsuddin, Siti Mariyam, et al.
Published: (2004)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2004)
An audio CAPTCHA to distinguish humans from computers
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Effect of the flash annealing on the impurity distribution and the electronic structure in the inversion layer
by: Sakata, Tomohiro, et al.
Published: (2015)
by: Sakata, Tomohiro, et al.
Published: (2015)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Similar Items
-
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
by: Ahmed Khalaf, Bashar
Published: (2019) -
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011) -
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017) -
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014) -
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)