UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

48 49 50
hits: 18,517
491.
  • RIS-Enabled Secret Key Gene... RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks
    Shawky, Mahmoud A; Shah, Syed Tariq; Abbasi, Qammer H ... Sensors (Basel, Switzerland), 04/2023, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Wireless communication has become an integral part of modern vehicles. However, securing the information exchanged between interconnected terminals poses a significant challenge. Effective security ...
Full text
492.
  • A survey of DDoS attacking ... A survey of DDoS attacking techniques and defence mechanisms in the IoT network
    Vishwakarma, Ruchi; Jain, Ankit Kumar Telecommunication systems, 2020/1, Volume: 73, Issue: 1
    Journal Article
    Peer reviewed

    Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous ...
Full text
493.
  • Attacks on Formation Contro... Attacks on Formation Control for Multiagent Systems
    Yang, Yue; Xiao, Yang; Li, Tieshan IEEE transactions on cybernetics, 2022-Dec., 2022-12-00, 20221201, Volume: 52, Issue: 12
    Journal Article
    Peer reviewed

    Multiagent systems (MASs) are distributed systems with two or more intelligent agents. Formation control is a significant control technique of MASs. To date, formation control on MASs is widely used ...
Full text
494.
  • Lightweight solutions to co... Lightweight solutions to counter DDoS attacks in software defined networking
    Conti, Mauro; Lal, Chhagan; Mohammadi, Reza ... Wireless networks, 1/7, Volume: 25, Issue: 5
    Journal Article
    Peer reviewed

    A distributed denial of service (DDoS) attack on any of the major components (e.g., controller, switches, and southbound channel) of software defined networking (SDN) architecture is a critical ...
Full text
495.
  • AALLA: Attack-Aware Logical... AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks
    Ali, Sameer; Tan, Saw Chin; Lee, Ching Kwang ... Sensors (Basel, Switzerland), 11/2023, Volume: 23, Issue: 21
    Journal Article
    Peer reviewed
    Open access

    Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane. This uniquely distinguishes it from the ...
Full text
496.
  • Resilient Cooperative Contr... Resilient Cooperative Control for Networked Lagrangian Systems Against DoS Attacks
    Li, Xiaolei; Wen, Changyun; Chen, Ci IEEE transactions on cybernetics, 2022-Feb., 2022-Feb, 2022-2-00, 20220201, Volume: 52, Issue: 2
    Journal Article
    Peer reviewed

    In this article, we study the distributed resilient cooperative control problem for directed networked Lagrangian systems under denial-of-service (DoS) attacks. The DoS attacks will block the ...
Full text
497.
  • ℋ∞ secure consensus of hidd... ℋ∞ secure consensus of hidden Markov jump multi‐agent systems subject to DoS attacks and disturbance
    Ding, Pengcheng; Shen, Hao; Xia, Jianwei ... International journal of robust and nonlinear control, April 2024, 2024-04-00, 20240401, Volume: 34, Issue: 6
    Journal Article
    Peer reviewed

    Summary This study investigates the ℋ∞$$ {\mathscr{H}}_{\infty } $$ secure consensus issue for Markov jump multi‐agent systems with denial‐of‐service attacks and disturbance. Considering that the ...
Full text
498.
  • SOChain: A Privacy-Preservi... SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain
    Yeh, Lo-Yao; Lu, Peggy Joy; Huang, Szu-Hao ... IEEE transactions on engineering management, 11/2020, Volume: 67, Issue: 4
    Journal Article
    Peer reviewed

    IoT devices provide a significant medium for distributed denial-of-service (DDoS) attacks. In 2016, a large-scale DDoS attack, named Dyn, caused massive damage to several well-known companies. One ...
Full text
499.
  • A Low-Rank and Sparse Matri... A Low-Rank and Sparse Matrix Decomposition-Based Mahalanobis Distance Method for Hyperspectral Anomaly Detection
    Zhang, Yuxiang; Du, Bo; Zhang, Liangpei ... IEEE transactions on geoscience and remote sensing, 2016-March, 2016-3-00, 20160301, Volume: 54, Issue: 3
    Journal Article
    Peer reviewed

    Anomaly detection is playing an increasingly important role in hyperspectral image (HSI) processing. The traditional anomaly detection methods mainly extract knowledge from the background and use the ...
Full text
500.
  • Realtime DDoS Defense Using... Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis
    Jing Zheng; Qi Li; Guofei Gu ... IEEE transactions on information forensics and security, 2018-July, 2018-7-00, Volume: 13, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Distributed denial-of-service (DDoS) defense is still a difficult problem though it has been extensively studied. The existing approaches are not capable of detecting various types of DDoS attacks. ...
Full text

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 18,517

Load filters