[1]
|
Ddos attack detection through digital twin technique in metaverse
|
|
2023 IEEE …,
2023 |
|
|
[2]
|
Machine Learning and Artificial Intelligence in Cybersecurity
|
|
2023 |
|
|
[3]
|
Artificial intelligence model for DDOS-detection
|
|
2023 |
|
|
[4]
|
Use of Blockchain in Crypto-Currency to secure cloud forensic trails
|
|
Trinity Journal of Management, IT & Media …,
2023 |
|
|
[5]
|
IoT Security using Machine Learning Techniques
|
|
Cyber Security Insights Magazine,
2022 |
|
|
[6]
|
Cyber Security Traits of a Future-Ready Organization
|
|
Cyber Security Insights Magazine,
2022 |
|
|
[7]
|
Cloud data assured deletion scheme based on dynamic sliding window
|
|
Peer-to-Peer Networking and Applications,
2022 |
|
|
[8]
|
DDoSDet: An approach to Detect DDoS attacks using Neural Networks
|
|
arXiv preprint arXiv:2201.09514,
2022 |
|
|
[9]
|
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
|
|
Journal of Information Security,
2022 |
|
|
[10]
|
Detection of DDOS Attack Using IDS Mechanism: A Review
|
|
2022 1st International …,
2022 |
|
|
[11]
|
Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
|
|
Cyber Security, Privacy and Networking,
2022 |
|
|
[12]
|
A Deep and Efficient Analysis of DDOS Attack in Software Defined Network
|
|
2022 |
|
|
[13]
|
A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information
|
|
2022 5th International …,
2022 |
|
|
[14]
|
Decentralized approach for data security of Medical IoT Devices
|
|
… Conference on Smart …,
2021 |
|
|
[15]
|
The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network
|
|
journal of Advanced …,
2021 |
|
|
[16]
|
Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
|
|
2021 |
|
|
[17]
|
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
|
|
International Conference on …,
2021 |
|
|
[18]
|
An Integrated BIM-IoT approach to support energy monitoring
|
|
… Conference on Smart …,
2021 |
|
|
[19]
|
A big data and deep learning based approach for ddos detection in cloud computing environment
|
|
2021 IEEE 10th Global …,
2021 |
|
|
[20]
|
How IoT is Making DDoS Attacks More Dangerous
|
|
2021 |
|
|
[21]
|
Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
|
|
2021 |
|
|
[22]
|
Analysis of Machine learning based XSS attack Detection Techniques
|
|
2021 |
|
|
[23]
|
Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
|
|
2021 |
|
|
[24]
|
Challenges of the System and Network Administration
|
|
2021 |
|
|
[25]
|
A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
|
|
2020 |
|
|
[26]
|
Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship Between Company Assets and Revenues
|
|
2020 |
|
|
[27]
|
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
|
|
2020 |
|
|
[28]
|
Uma Metodologia para análise de incidentes de segurança da informação
|
|
2020 |
|
|
[29]
|
Cross-site Scripting Attacks: Classification, Attack, and Countermeasures
|
|
2020 |
|
|
[30]
|
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
|
|
2020 |
|
|
[31]
|
The detection method of low-rate DoS attack based on multi-feature fusion
|
|
2020 |
|
|
[32]
|
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
|
|
2020 |
|
|
[33]
|
Ways to eliminate DDos attacks
|
|
2020 |
|
|
[34]
|
Методы обнаружения и предотвращения DDOS-атак
|
|
2019 |
|
|
[35]
|
Applying Multi-Level Theory to an Information Security Incident Domain Ontology.
|
|
2019 |
|
|
[36]
|
Systematic review of aspects of DDoS attacks detection
|
|
2019 |
|
|
[37]
|
Applying Multi-Level Theory to an Information Security Incident Domain Ontology
|
|
2019 |
|
|
[38]
|
A Review on Detection of DDOS Attack Using Machine Learning and Deep Learning Techniques
|
|
2019 |
|
|
[39]
|
Développement d'un protocole SCADA temps réel sécurisé à base de l'IEC 60870-5-101
|
|
2019 |
|
|
[40]
|
Smart Card Security: Applications, Attacks, and Countermeasures
|
|
2019 |
|
|
[41]
|
DDoS Attacks—Analysis and Prevention
|
|
Innovations in Computer Science and Engineering,
2019 |
|
|
[42]
|
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
|
|
2019 |
|
|
[43]
|
The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
|
|
2018 |
|
|
[44]
|
An efficient index structure for distributed k-nearest neighbours query processing
|
|
Soft Computing,
2018 |
|
|
[45]
|
Fixing the Cloud Forensic Problem with Blockchain
|
|
2018 |
|
|
[46]
|
Multi-agent-based DDoS detection on big data systems
|
|
2018 |
|
|
[47]
|
Security Analytics Tools and Implementation Success Factors: Instrument Development Using Delphi Approach and Exploratory Factor Analysis
|
|
2018 |
|
|
[48]
|
Could Block Chain Technology Help Resolve the Cloud Forensic Problem?
|
|
2018 |
|
|
[49]
|
Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
|
|
2018 |
|
|
[50]
|
Researching Cyber Weapons: An Enumerative Bibliography
|
|
Cyber Weaponry,
2018 |
|
|
[51]
|
Network Anomaly Detection and Prevention using Statistical and Machine Learning Approaches
|
|
2018 |
|
|
[52]
|
Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
|
|
2018 |
|
|
[53]
|
A Game Theory Model for Detection and Mitigation of Ddos Attacks on Web Servers
|
|
2018 |
|
|
[54]
|
Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy.
|
|
2017 |
|
|
[55]
|
Collaborative detection and filtering techniques against denial of service attacks in cloud computing
|
|
2017 |
|
|
[56]
|
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
|
|
Security and Communication Networks,
2017 |
|
|
[57]
|
COLLABORATIVE DETECTION AND FILTERING TECHNIQUES AGAINST DENIAL OF SERVICE ATTACKS IN CLOUD COMPUTING.
|
|
Journal of Theoretical and Applied Information Technology,
2017 |
|
|
[58]
|
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
|
|
Security and Communication Networks,
2017 |
|
|
[59]
|
Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
|
|
2017 |
|
|
[60]
|
Foreword
|
|
2017 |
|
|
[61]
|
Data-Driven Anomaly Detection in Industrial Networks
|
|
2017 |
|
|
[62]
|
An Empirical Study of The Impact of DoS, DDoS Attacks on Various Web Servers and Application Servers
|
|
Journal of Science and Technology on Information Security,
2017 |
|
|
[63]
|
Denial of service attacks detection using synchronization packets analysis
|
|
2017 |
|
|
[64]
|
Designing a Robust Closed-Loop Intrusion Detection Predictive Model Using Signal Processing Techniques in Cloud Computing Environment
|
|
2017 |
|
|
[65]
|
Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
|
|
Wireless Personal Communications,
2017 |
|
|
[66]
|
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
|
|
Security and Communication Networks,
2016 |
|
|
[67]
|
Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce
|
|
International Journal of Data Warehousing and Mining (IJDWM),
2016 |
|
|
[68]
|
Graphics processing unit based next generation DDoS prevention system
|
|
2016 |
|
|
[69]
|
Comparative analysis of features based machine learning approaches for phishing detection
|
|
2016 |
|
|
[70]
|
A survey of cloud-based network intrusion detection analysis
|
|
2016 |
|
|
[71]
|
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
|
|
2016 |
|
|
[72]
|
Recent survey of various defense mechanisms against phishing attacks
|
|
Journal of Information Privacy and Security,
2016 |
|
|
[73]
|
Bigdata platform based approach for defending against DDoS
|
|
Int'l Conf. on Advances in Big Data Analytics,
2016 |
|
|
[74]
|
Securing cloud computing.
|
|
2016 |
|
|
[75]
|
Distributed Denial of Service Prevention Techniques
|
|
2015 |
|
|
[76]
|
A Novel approach for Detection of Distributed Denial of Service attack in VANET
|
|
International Journal of Computer Applications,
2015 |
|
|
[77]
|
Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges
|
|
International Journal of Advanced Computer Science and Applications,
2015 |
|
|
[78]
|
Safety of data warehouse for remote laboratories in Laboratory Management System and network of road junctions
|
|
2015 |
|
|
[79]
|
Distributed Denial of Service (DDOS) Attack, Networks, Tools and DEFENSE.
|
|
International Journal of Applied Engineering Research,
2015 |
|
|
[80]
|
Defending Against DDOS Flooding Attacks-A Data Streaming Approach
|
|
2015 |
|
|
[81]
|
Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
|
|
International Journal of Engineering Research and Technology,
2015 |
|
|
[82]
|
Similarity Detection via Random Subsets for Cyber War Protection in Big Data using Hadoop Framework
|
|
2015 |
|
|
[83]
|
Defence for Distributed Denial of Service Attacks in Cloud Computing
|
|
Procedia Computer Science,
2015 |
|
|
[84]
|
DDoS detection and filtering technique in cloud environment using GARCH model
|
|
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE),
2015 |
|
|
[85]
|
A Proactive Approach to Intrusion Detection in Cloud Software as a Service
|
|
Achieving Enterprise Agility through Innovative Software Development,
2015 |
|
|
[86]
|
Botnet-originated DDoS attacks: Overview and Mitigation
|
|
2015 |
|
|
[87]
|
Detection of DDoS attack in VANET using LPN (Local Protection Node)
|
|
2015 |
|
|
[88]
|
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
|
|
2014 |
|
|
[89]
|
Defense against DoS attack: PSO approach in virtualization
|
|
2014 |
|
|
[90]
|
Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
|
|
2014 |
|
|
[91]
|
An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
|
|
2014 |
|
|
[92]
|
Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed
|
|
International Journal of Fuzzy Systems,
2014 |
|
|
[93]
|
Cyber Conflict Bibliography
|
|
GWU Legal Studies Research Paper,
2013 |
|
|
[94]
|
Digital compensation for timing mismatches in interleaved ADCs
|
|
2013 |
|
|
[95]
|
MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA PROGRAMA DE …
|
|
|
|
|
[96]
|
Malware Detection Techniques: A Comprehensive Study
|
|
|
|
|
[97]
|
Evolving Conversational AI: Analyzing the Development and Advancements in ChatGPT
|
|
|
|
|
[98]
|
Analysis of Rumour and Fake News Detection Techniques
|
|
|
|
|
[99]
|
A MODEL OF PREVENTING DDOS ATTACK USING IN-HYPERVISOR HOST-BASED IDPS
|
|
|
|
|
[100]
|
Ethical Considerations in the Deployment of AI Chatbots: Lessons from ChatGPT
|
|
|
|
|
[101]
|
Building Resilience Trust and Security in the Evolution to 6G Networks
|
|
|
|
|
[102]
|
The Crucial Role of Change Request Analysis in Enhancing 3GPP Security
|
|
|
|
|
[103]
|
Data Privacy with Elliptic Curve Cryptography
|
|
|
|
|
[104]
|
Advanced Techniques for Detecting Phishing URLs
|
|
|
|
|
[105]
|
Cyber Security in Healthcare
|
|
|
|
|
[106]
|
Analysing Ransomware Attacks and Strategies for Defence
|
|
|
|
|
[107]
|
Enhancing Cyber Security in the Banking Sector with Chatbot Assistance
|
|
|
|
|
[108]
|
Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
|
|
|
|
|
[109]
|
Understanding and Preventing Man-in-the-Middle Attacks in the Digital Age
|
|
|
|
|
[110]
|
Machine Learning Approaches in Chatbots for Dynamic Detection of Malware and Viruses
|
|
|
|
|
[111]
|
Exploring the Synergy of Blockchain and Federated Learning in Online Voting Systems
|
|
|
|
|
[112]
|
Enhancing Phishing Detection Through Multilayer Perceptron in Cybersecurity
|
|
|
|
|
[113]
|
An analysis of NLP (Natural Language Processing)
|
|
|
|
|
[114]
|
Mastering NGINX: A Comprehensive Guide to Web Server Excellence
|
|
|
|
|
[115]
|
A Meta-Learning Chatbot Assistance against Evolving Cyber-Attacks
|
|
|
|
|
[116]
|
Enhancing Cybersecurity with 2FA and Future Chat-bot Integration
|
|
|
|
|
[117]
|
The Future of Federated Learning: Collaborative Intelligence in a Decentralized World
|
|
|
|
|
[118]
|
Enhancing Player Experience and Data Privacy: Federated Learning in Online Gaming Platforms
|
|
|
|
|
[119]
|
Mechanism, Tools and Techniques to Mitigate Distributed Denial of Service Attacks
|
|
|
|
|