UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 18,181
1.
Full text

PDF
2.
  • Botnets and Internet of Thi... Botnets and Internet of Things Security
    Bertino, Elisa; Islam, Nayeem Computer (Long Beach, Calif.), 2017-Feb., 2017-2-00, 20170201, Volume: 50, Issue: 2
    Journal Article
    Peer reviewed

    Recent distributed denial-of-service attacks demonstrate the high vulnerability of Internet of Things (IoT) systems and devices. Addressing this challenge will require scalable security solutions ...
Full text
3.
  • Event-Based Formation Contr... Event-Based Formation Control for Nonlinear Multiagent Systems Under DoS Attacks
    Tang, Yang; Zhang, Dandan; Shi, Peng ... IEEE transactions on automatic control, 2021-Jan., 2021-1-00, 20210101, Volume: 66, Issue: 1
    Journal Article
    Peer reviewed

    This article focuses on the formation control problem of nonlinear multiagent systems under denial-of-service attacks. The formation control can be preserved by the distributed hybrid ...
Full text
4.
  • Stabilization of Networked ... Stabilization of Networked Control Systems Under DoS Attacks and Output Quantization
    Wakaiki, Masashi; Cetinkaya, Ahmet; Ishii, Hideaki IEEE transactions on automatic control, 08/2020, Volume: 65, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    This article addresses quantized output feedback stabilization under denial-of-service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an ...
Full text

PDF
5.
  • A Survey of Defense Mechani... A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi; Joshi, James; Tipper, David IEEE Communications surveys and tutorials, 01/2013, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' ...
Full text

PDF
6.
  • Quantized Consensus Under D... Quantized Consensus Under Data-Rate Constraints and DoS Attacks: A Zooming-In and Holding Approach
    Ran, Maopeng; Feng, Shuai; Li, Juncheng ... IEEE transactions on automatic control, 09/2023, Volume: 68, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    This paper is concerned with the quantized consensus problem for uncertain nonlinear multi-agent systems under data-rate constraints and Denial-of-Service (DoS) attacks. The agents are modeled in ...
Full text
7.
  • Resilient Control of Networ... Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach
    Yuan, Yuan; Yuan, Huanhuan; Guo, Lei ... IEEE transactions on industrial informatics, 10/2016, Volume: 12, Issue: 5
    Journal Article

    We consider the problem of resilient control of networked control system (NCS) under denial-of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra constraints in the NCS, ...
Full text
8.
  • Lucid: A Practical, Lightwe... Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
    Doriguzzi-Corin, R.; Millar, S.; Scott-Hayward, S. ... IEEE eTransactions on network and service management, 2020-June, 2020-6-00, 20200601, Volume: 17, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's Internet, disrupting the availability of essential services. The challenge of DDoS detection is the ...
Full text

PDF
9.
  • The elephant in the room The elephant in the room
    Zerubavel, Eviatar 2006., 2006-03-09, 2006, 2007-11-01
    eBook

    The fable of the Emperor's New Clothes is a classic example of a conspiracy of silence, a situation where everyone refuses to acknowledge an obvious truth. But the denial of social realities -- ...
Full text
10.
  • Software-defined Networking... Software-defined Networking-based DDoS Defense Mechanisms
    Swami, Rochak; Dave, Mayank; Ranga, Virender ACM computing surveys, 05/2019, Volume: 52, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial of Service attack (DDoS) is recognized to be one of the most catastrophic attacks against various digital communication entities. Software-defined networking (SDN) is an emerging ...
Full text

PDF
1 2 3 4 5
hits: 18,181

Load filters