Zobrazeno 1 - 10
of 246
pro vyhledávání: '"Joshi, R. C."'
The recent developments in the field of biomedicine have made large volumes of biomedical literature available to the medical practitioners. Due to the large size and lack of efficient searching strategies, medical practitioners struggle to obtain ne
Externí odkaz:
http://arxiv.org/abs/1805.05927
Publikováno v:
International Journal of Computer and Electrical Engineering (IJCEE), vol. 2, number 2, pp. 268-276, 2010
The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the
Externí odkaz:
http://arxiv.org/abs/1208.3557
Publikováno v:
International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009 1793-821X
Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect so
Externí odkaz:
http://arxiv.org/abs/1204.5592
Publikováno v:
Proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009,India
In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to
Externí odkaz:
http://arxiv.org/abs/1204.5590
Publikováno v:
International Journal of Information Assurance and Security (JIAS), vol. 3, no. 2, pp. 102-110, 2008
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packe
Externí odkaz:
http://arxiv.org/abs/1203.2400
Publikováno v:
Int. J. Multimedia Intelligence and Security, Vol. 1, No. 4, pp.378-391
Anomaly-based DDoS detection systems construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic deviate from normal profile beyond a threshold. This extend of deviation is normally not utilised. This paper
Externí odkaz:
http://arxiv.org/abs/1203.2399
Publikováno v:
Diversity and Distributions, 2008 Jul 01. 14(4), 701-712.
Externí odkaz:
http://dx.doi.org/10.1111/j.1472-4642.2008.00483.x
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.