Loading…
Loading…
Loading…
iClassMFT: Proposed Multiple Flow Tables Classes to Integrate Security and Flexibility into SDN Switches
Amaro Galhardo, Edwardes, Oliveira, Antonio Carlos
Published in 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2019)
Published in 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2019)
Get full text
Conference Proceeding
Loading…
Profiling IoT-Based Botnet Traffic Using DNS
Dwyer, Owen P., Marnerides, Angelos K., Giotsas, Vasileios, Mursch, Troy
Published in IEEE Global Communications Conference (Online) (01.12.2019)
Published in IEEE Global Communications Conference (Online) (01.12.2019)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Ukraine: Rebel leader's online chat undergoes "intensive" DDoS-attack
Published in BBC Monitoring Former Soviet Union
(08.06.2016)
Get full text
Newsletter
Loading…
Implementing Machine Learning Algorithms to Indentify Distributed Denial-of-Service Attacks
Mehra, Ankush, Singh, Gurpreet, Badotra, Sumit, Kaur, Balwinder, Verma, Amit
Published in ICIIP ... proceedings (Online) (22.11.2023)
Published in ICIIP ... proceedings (Online) (22.11.2023)
Get full text
Conference Proceeding
Loading…
Loading…
Interest flooding attack and countermeasures in Named Data Networking
Afanasyev, Alexander, Mahadevan, Priya, Moiseenko, Ilya, Uzun, Ersin, Lixia Zhang
Published in 2013 IFIP Networking Conference (01.05.2013)
Get full text
Published in 2013 IFIP Networking Conference (01.05.2013)
Conference Proceeding
Loading…
SYSTEM AND METHOD OF TRAFFIC FILTERING UPON DETECTION OF A DDOS ATTACK
Year of Publication 06.06.2017
Get full text
Patent
Loading…
DDoS Mitigation: A Measurement-Based Approach
Jonker, Mattijs, Sperotto, Anna, Pras, Aiko
Published in IEEE/IFIP Network Operations and Management Symposium (01.04.2020)
Published in IEEE/IFIP Network Operations and Management Symposium (01.04.2020)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase
Panchal, Deven, Musgrove, Dan, Baran, Isilay, Lu, David
Published in Australasian Telecommunication Networks and Applications Conference [proceedings] (29.11.2023)
Published in Australasian Telecommunication Networks and Applications Conference [proceedings] (29.11.2023)
Get full text
Conference Proceeding