Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment"
written by Sanjeev Kumar, Orifiel Gomez,
published by Journal of Information Security, Vol.1 No.2, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Cyber Security Evaluation of CentOS Red Hat Based Operating System Under Cyber Attack with Increasing Magnitude
2020
[2] Can Routers Provide Sufficient Protection against Cyber Security Attacks?
2019
[3] Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
2019
[4] Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
2018
[5] Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification
2018
[6] Security Evaluation of Virtualized Computing Platforms
ProQuest Dissertations Publishing, 2017
[7] An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
2017
[8] PERANCANGAN DAN IMPLEMENTASI NETWORK MONITORING SYSTEM PADA JARINGAN LAN (LOCAL AREA NETWORK) DENGAN NOTIFIKASI PADA MEDIA SOSIAL TWITTER
2016
[9] Generátor kybernetických útoků
2016
[10] Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server
International Journal of Network Management, 2016
[11] Doctorat ParisTech
2015
[12] Techniques for efficient and fault-tolerant geo-replication
2015
[13] A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues
2014
[14] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZESTĘPCZOŚCIĄ INTERNETOWĄ.
2014
[15] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZESTĉPCZOĝCIĄ INTERNETOWĄ
2014
[16] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZEST?PCZO?CI? INTERNETOW?
Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedza/Studies & Proceedings Polish Association for Knowledge Management, 2014
[17] 사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰
한국경호경비학회지, 2014
[18] THE CHANGING FACE OF CYBERCRIME: HOW MOBILE DEVICES HAVE CHANGED THE APPROACH TO COMMITTING CYBERCRIME
2014
[19] End-User Awareness of and Adherence to Crisis Preparedness of the Information Systems in New Zealand Organisations
2013
[20] Implementation of Echo State Neural Network and Radial Basis Function Network for Intrusion Detection
Data Mining and Knowledge Engineering, 2013
[21] Enhance the Security and Performance of IP over Ethernet Networks by Reduction the Naming System Design
WK Alzubaidi, L Cai, SA Alyawer - cscjournals.org, 2012
[22] Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks
Security & Privacy, IEEE, 2012
[23] 一种基于第三方确认的防ARP 欺骗的方法
科技创业月刊, 2012
[24] A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack
International Journal of Computer Science Issues (IJCSI), 2011
[25] Arp storm detection and prevention measures
International Journal of Computer Science Issues, 2011
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top