Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 53
1.
  • Analyzing well-known counte... Analyzing well-known countermeasures against distributed denial of service attacks
    Beitollahi, Hakem; Deconinck, Geert Computer communications, 06/2012, Volume: 35, Issue: 11
    Journal Article
    Peer reviewed

    This paper reviews and analyzes well-known countermeasures against distributed denial of service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure and enumerates ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
2.
  • Optimizing Information Fres... Optimizing Information Freshness in Dual-Connection Cellular Networks for Real-Time Applications
    Ibrahim Rasul, Ababakr; Beitollahi, Hakem IEEE access, 2024, Volume: 12
    Journal Article
    Peer reviewed
    Open access

    Emerging cellular networks integrate diverse technologies like millimeter wave (mmWave) to deliver high capacity but face challenges like blockage sensitivity. Dual connections (DC) enhance ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Application Layer DDoS Atta... Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function
    Beitollahi, Hakem; Sharif, Dyari Mohammad; Fazeli, Mahdi IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • Detection of Application-la... Detection of Application-layer DDoS Attacks Produced by Various Freely Accessible Toolkits using Machine Learning
    Sharif, Dyari Mohammed; Beitollahi, Hakem; Fazeli, Mahdi IEEE access, 01/2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial of Service (DDoS) attacks are a growing threat to online services, and various methods have been developed to detect them. However, past research has mainly focused on identifying ...
Full text
Available for: NUK, UL, UM, UPUK
5.
  • ConnectionScore: a statisti... ConnectionScore: a statistical technique to resist application-layer DDoS attacks
    Beitollahi, Hakem; Deconinck, Geert Journal of ambient intelligence and humanized computing, 06/2014, Volume: 5, Issue: 3
    Journal Article
    Peer reviewed

    In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
6.
  • BAS: A BTI-based aging awar... BAS: A BTI-based aging aware synthesis in FPGAs
    Abednazari, Mohammad; Beitollahi, Hakem Microelectronics and reliability, December 2022, 2022-12-00, Volume: 139
    Journal Article
    Peer reviewed

    Aging mechanisms in FPGA devices cause performance degradation and lead to lifetime reduction. Among multiple aging mechanisms, Biased-Temperature-Instability (BTI) aging mechanism is the dominant ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • Q-Thermal: A Q-Learning-Bas... Q-Thermal: A Q-Learning-Based Thermal-Aware Routing Algorithm for 3-D Network On-Chips
    Shahabinejad, Narges; Beitollahi, Hakem IEEE transactions on components, packaging, and manufacturing technology (2011), 09/2020, Volume: 10, Issue: 9
    Journal Article
    Peer reviewed

    The multilayer structure of 3-D network-on-chips (3-D NoC) leads to the unequal thermal conductance between different layers and, as a result, an unbalanced thermal distribution in the chip. This ...
Full text
Available for: IJS, NUK, UL
9.
  • Edge-sorter: A hardware sor... Edge-sorter: A hardware sorting engine for area & power constrained edge computing devices
    Beitollahi, Hakem; Pandi, Marziye; Moghaddas, Mostafa Microprocessors and microsystems, March 2024, 2024-03-00, Volume: 105
    Journal Article
    Peer reviewed

    In recent years, hardware sorters have been an attracted topic for researchers. Since hardware sorters play a crucial role in embedded systems, several attempts have been made to efficiently design ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • HRHS: A High-Performance Re... HRHS: A High-Performance Real-Time Hardware Scheduler
    Derafshi, Danesh; Norollah, Amin; Khosroanjam, Mohsen ... IEEE transactions on parallel and distributed systems, 2020-April-1, 2020-4-1, Volume: 31, Issue: 4
    Journal Article
    Peer reviewed

    This article represents an on-line time-predictable distributed hardware scheduler solution, suitable for many-core systems. We have partitioned the Main scheduler into uniform Partial schedulers to ...
Full text
Available for: IJS, NUK, UL
1 2 3 4 5
hits: 53

Load filters