[1]
|
Cloud data assured deletion scheme based on dynamic sliding window
|
|
Peer-to-Peer Networking and Applications,
2022 |
|
|
[2]
|
A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information
|
|
2022 5th International …,
2022 |
|
|
[3]
|
DDoSDet: An approach to Detect DDoS attacks using Neural Networks
|
|
arXiv preprint arXiv:2201.09514,
2022 |
|
|
[4]
|
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
|
|
Journal of Information Security,
2022 |
|
|
[5]
|
Detection of DDOS Attack Using IDS Mechanism: A Review
|
|
2022 1st International …,
2022 |
|
|
[6]
|
Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
|
|
Cyber Security, Privacy and Networking,
2022 |
|
|
[7]
|
A Deep and Efficient Analysis of DDOS Attack in Software Defined Network
|
|
2022 |
|
|
[8]
|
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
|
|
International Conference on …,
2021 |
|
|
[9]
|
Decentralized approach for data security of Medical IoT Devices
|
|
… Conference on Smart …,
2021 |
|
|
[10]
|
The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network
|
|
journal of Advanced …,
2021 |
|
|
[11]
|
An Integrated BIM-IoT approach to support energy monitoring
|
|
… Conference on Smart …,
2021 |
|
|
[12]
|
A big data and deep learning based approach for ddos detection in cloud computing environment
|
|
2021 IEEE 10th Global …,
2021 |
|
|
[13]
|
How IoT is Making DDoS Attacks More Dangerous
|
|
2021 |
|
|
[14]
|
Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
|
|
2021 |
|
|
[15]
|
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
|
|
2020 |
|
|
[16]
|
Uma Metodologia para análise de incidentes de segurança da informação
|
|
2020 |
|
|
[17]
|
Cross-site Scripting Attacks: Classification, Attack, and Countermeasures
|
|
2020 |
|
|
[18]
|
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
|
|
2020 |
|
|
[19]
|
The detection method of low-rate DoS attack based on multi-feature fusion
|
|
2020 |
|
|
[20]
|
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
|
|
2020 |
|
|
[21]
|
Ways to eliminate DDos attacks
|
|
2020 |
|
|
[22]
|
A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
|
|
2020 |
|
|
[23]
|
Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship Between Company Assets and Revenues
|
|
2020 |
|
|
[24]
|
Методы обнаружения и предотвращения DDOS-атак
|
|
2019 |
|
|
[25]
|
Applying Multi-Level Theory to an Information Security Incident Domain Ontology.
|
|
2019 |
|
|
[26]
|
Systematic review of aspects of DDoS attacks detection
|
|
2019 |
|
|
[27]
|
Applying Multi-Level Theory to an Information Security Incident Domain Ontology
|
|
2019 |
|
|
[28]
|
A Review on Detection of DDOS Attack Using Machine Learning and Deep Learning Techniques
|
|
2019 |
|
|
[29]
|
Développement d'un protocole SCADA temps réel sécurisé à base de l'IEC 60870-5-101
|
|
2019 |
|
|
[30]
|
Smart Card Security: Applications, Attacks, and Countermeasures
|
|
2019 |
|
|
[31]
|
DDoS Attacks—Analysis and Prevention
|
|
Innovations in Computer Science and Engineering,
2019 |
|
|
[32]
|
The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
|
|
2018 |
|
|
[33]
|
An efficient index structure for distributed k-nearest neighbours query processing
|
|
Soft Computing,
2018 |
|
|
[34]
|
Fixing the Cloud Forensic Problem with Blockchain
|
|
2018 |
|
|
[35]
|
Multi-agent-based DDoS detection on big data systems
|
|
2018 |
|
|
[36]
|
Security Analytics Tools and Implementation Success Factors: Instrument Development Using Delphi Approach and Exploratory Factor Analysis
|
|
2018 |
|
|
[37]
|
Could Block Chain Technology Help Resolve the Cloud Forensic Problem?
|
|
2018 |
|
|
[38]
|
Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
|
|
2018 |
|
|
[39]
|
Researching Cyber Weapons: An Enumerative Bibliography
|
|
Cyber Weaponry,
2018 |
|
|
[40]
|
Network Anomaly Detection and Prevention using Statistical and Machine Learning Approaches
|
|
2018 |
|
|
[41]
|
Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
|
|
2018 |
|
|
[42]
|
A Game Theory Model for Detection and Mitigation of Ddos Attacks on Web Servers
|
|
2018 |
|
|
[43]
|
Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy.
|
|
2017 |
|
|
[44]
|
Collaborative detection and filtering techniques against denial of service attacks in cloud computing
|
|
2017 |
|
|
[45]
|
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
|
|
Security and Communication Networks,
2017 |
|
|
[46]
|
COLLABORATIVE DETECTION AND FILTERING TECHNIQUES AGAINST DENIAL OF SERVICE ATTACKS IN CLOUD COMPUTING.
|
|
Journal of Theoretical and Applied Information Technology,
2017 |
|
|
[47]
|
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
|
|
Security and Communication Networks,
2017 |
|
|
[48]
|
Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
|
|
2017 |
|
|
[49]
|
Foreword
|
|
2017 |
|
|
[50]
|
Data-Driven Anomaly Detection in Industrial Networks
|
|
2017 |
|
|
[51]
|
An Empirical Study of The Impact of DoS, DDoS Attacks on Various Web Servers and Application Servers
|
|
Journal of Science and Technology on Information Security,
2017 |
|
|
[52]
|
Denial of service attacks detection using synchronization packets analysis
|
|
2017 |
|
|
[53]
|
Designing a Robust Closed-Loop Intrusion Detection Predictive Model Using Signal Processing Techniques in Cloud Computing Environment
|
|
2017 |
|
|
[54]
|
Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
|
|
Wireless Personal Communications,
2017 |
|
|
[55]
|
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
|
|
Security and Communication Networks,
2016 |
|
|
[56]
|
Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce
|
|
International Journal of Data Warehousing and Mining (IJDWM),
2016 |
|
|
[57]
|
Graphics processing unit based next generation DDoS prevention system
|
|
2016 |
|
|
[58]
|
Comparative analysis of features based machine learning approaches for phishing detection
|
|
2016 |
|
|
[59]
|
A survey of cloud-based network intrusion detection analysis
|
|
2016 |
|
|
[60]
|
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
|
|
2016 |
|
|
[61]
|
Recent survey of various defense mechanisms against phishing attacks
|
|
Journal of Information Privacy and Security,
2016 |
|
|
[62]
|
Bigdata platform based approach for defending against DDoS
|
|
Int'l Conf. on Advances in Big Data Analytics,
2016 |
|
|
[63]
|
Securing cloud computing.
|
|
2016 |
|
|
[64]
|
Distributed Denial of Service Prevention Techniques
|
|
2015 |
|
|
[65]
|
A Novel approach for Detection of Distributed Denial of Service attack in VANET
|
|
International Journal of Computer Applications,
2015 |
|
|
[66]
|
Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges
|
|
International Journal of Advanced Computer Science and Applications,
2015 |
|
|
[67]
|
Safety of data warehouse for remote laboratories in Laboratory Management System and network of road junctions
|
|
2015 |
|
|
[68]
|
Distributed Denial of Service (DDOS) Attack, Networks, Tools and DEFENSE.
|
|
International Journal of Applied Engineering Research,
2015 |
|
|
[69]
|
Defending Against DDOS Flooding Attacks-A Data Streaming Approach
|
|
2015 |
|
|
[70]
|
Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
|
|
International Journal of Engineering Research and Technology,
2015 |
|
|
[71]
|
Similarity Detection via Random Subsets for Cyber War Protection in Big Data using Hadoop Framework
|
|
2015 |
|
|
[72]
|
Defence for Distributed Denial of Service Attacks in Cloud Computing
|
|
Procedia Computer Science,
2015 |
|
|
[73]
|
DDoS detection and filtering technique in cloud environment using GARCH model
|
|
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE),
2015 |
|
|
[74]
|
A Proactive Approach to Intrusion Detection in Cloud Software as a Service
|
|
Achieving Enterprise Agility through Innovative Software Development,
2015 |
|
|
[75]
|
Botnet-originated DDoS attacks: Overview and Mitigation
|
|
2015 |
|
|
[76]
|
Detection of DDoS attack in VANET using LPN (Local Protection Node)
|
|
2015 |
|
|
[77]
|
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
|
|
2014 |
|
|
[78]
|
Defense against DoS attack: PSO approach in virtualization
|
|
2014 |
|
|
[79]
|
Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
|
|
2014 |
|
|
[80]
|
An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
|
|
2014 |
|
|
[81]
|
Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed
|
|
International Journal of Fuzzy Systems,
2014 |
|
|
[82]
|
Cyber Conflict Bibliography
|
|
GWU Legal Studies Research Paper,
2013 |
|
|
[83]
|
Digital compensation for timing mismatches in interleaved ADCs
|
|
2013 |
|
|
[84]
|
Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
|
|
|
|
|
[85]
|
IoT Security using Machine Learning Techniques
|
|
|
|
|
[86]
|
Cyber Security Traits of a Future-Ready Organization
|
|
|
|
|
[87]
|
Analysis of Machine learning based XSS attack Detection Techniques
|
|
|
|
|
[88]
|
Cyber Security, Laws & Policy: A Study
|
|
|
|
|
[89]
|
Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
|
|
|
|
|
[90]
|
Challenges of the System and Network Administration
|
|
|
|
|
[91]
|
Efficient graphics processing unit based algorithms for high-throughput communication systems
|
|
|
|
|
[92]
|
DDOS attack detection and prevention methods
|
|
|
|
|