UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 18,420
1.
  • A survey of distributed den... A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva; Xiao, Yang; Sun, Guang ... International journal of distributed sensor networks, 12/2017, Volume: 13, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense ...
Full text

PDF
2.
  • Botnets and Internet of Thi... Botnets and Internet of Things Security
    Bertino, Elisa; Islam, Nayeem Computer (Long Beach, Calif.), 2017-Feb., 2017-2-00, 20170201, Volume: 50, Issue: 2
    Journal Article
    Peer reviewed

    Recent distributed denial-of-service attacks demonstrate the high vulnerability of Internet of Things (IoT) systems and devices. Addressing this challenge will require scalable security solutions ...
Full text
3.
  • Event-Based Formation Contr... Event-Based Formation Control for Nonlinear Multiagent Systems Under DoS Attacks
    Tang, Yang; Zhang, Dandan; Shi, Peng ... IEEE transactions on automatic control, 2021-Jan., 2021-1-00, 20210101, Volume: 66, Issue: 1
    Journal Article
    Peer reviewed

    This article focuses on the formation control problem of nonlinear multiagent systems under denial-of-service attacks. The formation control can be preserved by the distributed hybrid ...
Full text
4.
  • Stabilization of Networked ... Stabilization of Networked Control Systems Under DoS Attacks and Output Quantization
    Wakaiki, Masashi; Cetinkaya, Ahmet; Ishii, Hideaki IEEE transactions on automatic control, 08/2020, Volume: 65, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    This article addresses quantized output feedback stabilization under denial-of-service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an ...
Full text

PDF
5.
  • A Survey of Defense Mechani... A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi; Joshi, James; Tipper, David IEEE Communications surveys and tutorials, 01/2013, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' ...
Full text

PDF
6.
  • Lucid: A Practical, Lightwe... Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
    Doriguzzi-Corin, R.; Millar, S.; Scott-Hayward, S. ... IEEE eTransactions on network and service management, 2020-June, 2020-6-00, 20200601, Volume: 17, Issue: 2
    Journal Article
    Peer reviewed

    Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's Internet, disrupting the availability of essential services. The challenge of DDoS detection is the ...
Full text

PDF
7.
  • Distributed Resilient Obser... Distributed Resilient Observer-Based Fault-Tolerant Control for Heterogeneous Multiagent Systems Under Actuator Faults and DoS Attacks
    Deng, Chao; Wen, Changyun IEEE transactions on control of network systems, 09/2020, Volume: 7, Issue: 3
    Journal Article
    Peer reviewed

    In this article, we investigate the distributed resilient observer-based fault-tolerant control problem for heterogeneous linear multiagent systems in the presence of actuator faults and ...
Full text
8.
  • Resilient Control of Networ... Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach
    Yuan, Yuan; Yuan, Huanhuan; Guo, Lei ... IEEE transactions on industrial informatics, 10/2016, Volume: 12, Issue: 5
    Journal Article

    We consider the problem of resilient control of networked control system (NCS) under denial-of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra constraints in the NCS, ...
Full text
9.
  • The elephant in the room The elephant in the room
    Zerubavel, Eviatar 2006., 2006-03-09, 2006, 2007-11-01
    eBook

    The fable of the Emperor's New Clothes is a classic example of a conspiracy of silence, a situation where everyone refuses to acknowledge an obvious truth. But the denial of social realities -- ...
Full text
10.
Full text

PDF
1 2 3 4 5
hits: 18,420

Load filters