Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks"
written by Hari Krishna Vellalacheruvu, Sanjeev Kumar,
published by Journal of Information Security, Vol.2 No.3, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] DDoSDet: An approach to Detect DDoS attacks using Neural Networks
arXiv preprint arXiv:2201.09514, 2022
[2] Testing and Comparing the Performances of Windows Server 2022, Ubuntu 20. 04 and CentOS 8 under DDoS Attacks
2022
[3] Smurf as Spoof Type Attacking Activity on Network and Neutralization
Journal of Physics …, 2021
[4] The Cyber Security Evaluation of a Wireless and Wired Smart Electric Meter
2021
[5] DDoS Attack Detection Using Artificial Neural Network
2021
[6] Cyber Security Evaluation of CentOS Red Hat Based Operating System Under Cyber Attack with Increasing Magnitude
2020
[7] Can Routers Provide Sufficient Protection against Cyber Security Attacks?
2019
[8] Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
2018
[9] Security Evaluation of Virtualized Computing Platforms
ProQuest Dissertations Publishing, 2017
[10] Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions
Journal of the Korea Industrial Information Systems Research, 2017
[11] Do ICMP Security Attacks Have Same Impact on Servers?
2017
[12] Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
2016
[13] Impact of virtualization on cloud network security
ProQuest Dissertations Publishing, 2016
[14] Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
International Journal of Engineering Research and Technology, 2015
[15] Dynamic Security Level Changing Strategy Using Attack Predictions-Case Study of TCP SYN Attacks
IT Convergence and Security (ICITCS), 2014 International Conference on, 2014
[16] Ambientes Controlados de Geração de Anomalias: Uma Reprodução de Ataques de Negação de Serviço
WAP Sukeyosi1, EP de Mattos, B Bogaz, LSM Zarpel?o�, 2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top