X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (5638) 5638
Journal Article (2559) 2559
Patent (1134) 1134
Conference Proceeding (1047) 1047
Dissertation (977) 977
Book / eBook (476) 476
Magazine Article (281) 281
Publication (213) 213
Book Review (160) 160
Reference (91) 91
Book Chapter (68) 68
Trade Publication Article (64) 64
Newsletter (42) 42
Web Resource (24) 24
Government Document (12) 12
Streaming Video (10) 10
Paper (8) 8
Report (6) 6
Publication Article (5) 5
Transcript (3) 3
Technical Report (2) 2
Poem (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
mechanical engineering (828) 828
weapons (828) 828
blasting (824) 824
heating (824) 824
lighting (824) 824
armour (775) 775
armoured or armed vehicles (775) 775
armoured turrets (775) 775
means of attack or defence, e.g. camouflage, in general (775) 775
dos (621) 621
computer crime (494) 494
performing operations (465) 465
transporting (465) 465
security (399) 399
dos attack (384) 384
chemistry (332) 332
denial of service attacks (329) 329
metallurgy (324) 324
general tagging of cross-sectional technologies spanning over several sections of the ipc (297) 297
general tagging of new technological developments (297) 297
technical subjects covered by former uspc cross-reference art collections [xracs] and digests (297) 297
technical subjects covered by former uspc (265) 265
dos attacks (261) 261
human necessities (253) 253
technical subjects covered by former us classification (239) 239
layered products (226) 226
layered products, i.e. products built-up of strata of flat ornon-flat, e.g. cellular or honeycomb, form (226) 226
internet (215) 215
denial of service (206) 206
telecommunications (205) 205
dos-attacke (199) 199
protocols (198) 198
authentication (187) 187
computer science, information systems (175) 175
network security (168) 168
ddos (167) 167
computer science (163) 163
servers (162) 162
engineering, electrical & electronic (161) 161
intrusion detection (157) 157
networks (155) 155
ip networks (147) 147
explosives (141) 141
matches (140) 140
gas-attack compositions (138) 138
generation of gas for blasting or propulsion (138) 138
means for generating smoke or mist (138) 138
analysis (136) 136
computer security (132) 132
physics (131) 131
vehicles in general (124) 124
technical subjects covered by former uspc cross-reference artcollections [xracs] and digests (114) 114
floods (113) 113
wireless sensor networks (112) 112
wireless networks (107) 107
agriculture (103) 103
forestry (97) 97
routing (94) 94
paper (91) 91
textiles (91) 91
computer networks (89) 89
data security (89) 89
trapping (89) 89
hunting (88) 88
ad hoc networks (87) 87
animal husbandry (87) 87
fishing (87) 87
computer information security (86) 86
engineering (86) 86
algorithms (85) 85
history (83) 83
monitoring (83) 83
ids (82) 82
manufacture thereof (81) 81
denial-of-service (80) 80
computer communication networks (79) 79
cryptography (79) 79
explosives or thermic compositions (79) 79
use of single substances as explosives (79) 79
biocides, e.g. as disinfectants, as pesticides, as herbicides (78) 78
cloud computing (78) 78
pest repellants or attractants (78) 78
plant growth regulators (78) 78
preservation of bodies of humans or animals or plants or partsthereof (78) 78
testing (77) 77
ip traceback (73) 73
denial of service attack (72) 72
terrorism (72) 72
bandwidth (71) 71
routing protocols (70) 70
mathematical models (68) 68
organic chemistry (68) 68
studies (66) 66
mathematics (64) 64
methods (64) 64
ammunition (63) 63
computers (62) 62
dos-angriff (62) 62
electronic books (62) 62
fixed constructions (61) 61
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Gerstein Science - Stacks (134) 134
Engineering & Comp. Sci. - Stacks (115) 115
Robarts - Stacks (70) 70
UofT at Mississauga - Stacks (62) 62
UTL at Downsview - May be requested (59) 59
Mathematical Sciences - Stacks (49) 49
UofT at Scarborough - Stacks (45) 45
Collection Dvlpm't (Acquisitions) - Closed Orders (33) 33
Collection Dvlpm't (Acquisitions) - Vendor file (21) 21
Physics - Stacks (21) 21
Aerospace - Stacks (20) 20
St. Michael's College (John M. Kelly) - 2nd Floor (19) 19
Earth Sciences (Noranda) - Stacks (13) 13
Victoria University E.J. Pratt - Stacks (13) 13
Online Resources - Online (9) 9
Astronomy & Astrophysics - Ask at library (7) 7
Trinity College (John W Graham) - Stacks (7) 7
Trinity College (John W Graham) - Storage (7) 7
Engineering & Comp. Sci. - Missing (6) 6
OISE - Stacks (6) 6
Royal Ontario Museum - Stacks (4) 4
Mathematical Sciences - Missing (3) 3
Engineering & Comp. Sci. - May be requested in 6-10 wks (2) 2
Engineering & Comp. Sci. - Reference (2) 2
Thomas Fisher Rare Book - Rare Book (2) 2
UofT Schools - Stacks (2) 2
Aerospace - Reference (1) 1
Architecture Landscape (Shore + Moffat) - Stacks (1) 1
Baycrest Hospital - Stacks (1) 1
Chemistry (A D Allen) - In transit (1) 1
Chemistry (A D Allen) - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - Cancelled Order (1) 1
Criminology - Stacks (1) 1
Dentistry (Harry R Abbott) - Stacks (1) 1
Faculty of Information - Stacks (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Missing (1) 1
Gerstein Science - Not Returned (1) 1
Gerstein Science - Searching (1) 1
Holland Bloorview Kids Rehabilitation - Stacks (1) 1
Indust. Rel's & Hum. Resources (Newman) - Stacks (1) 1
Innis College - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Mathematical Sciences - May be requested in 6-10 wks (1) 1
New College (Ivey) - Stacks (1) 1
Robarts - Reference (1) 1
Royal Ontario Museum - Canadiana Rare (1) 1
Royal Ontario Museum - Reference (1) 1
Scarborough Hospital - Stacks (1) 1
St. Michael's College (John M. Kelly) - Circulation Desk (1) 1
Sunnybrook Health Sciences Centre - Sunnybrook Stacks (1) 1
Thomas Fisher Rare Book - May be requested at Fisher (1) 1
Toronto East General Hospital - Stacks (1) 1
University College (Laidlaw) - Purdy (1) 1
Victoria University E.J. Pratt - Storage (1) 1
Victoria University Emmanuel College - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (9163) 9163
Portuguese (2801) 2801
Spanish (342) 342
Japanese (120) 120
Chinese (55) 55
German (50) 50
French (40) 40
Italian (31) 31
Korean (14) 14
Swedish (11) 11
Czech (9) 9
Russian (7) 7
Arabic (4) 4
Bengali (1) 1
Hindi (1) 1
Latin (1) 1
Lithuanian (1) 1
Slovak (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2016, ISBN 1498729649, xxiv, 288 pages
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect... 
Denial of service attacks | Mathematics | Software Engineering & Systems Development | Cryptology | IT Security | Security measures | Computer networks
Book
IEEE Transactions on Power Systems, ISSN 0885-8950, 09/2017, Volume 32, Issue 5, pp. 4110 - 4118
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 04/2014, Volume 40, Issue 1, pp. 307 - 324
To prevent and defend networks from the occurrence of attacks, it is highly essential that we have a broad knowledge of existing tools and systems available in... 
Tools | DoS | Network attacks | Protocol | Systems | COMPUTER SCIENCE, SOFTWARE ENGINEERING | DEFENSE | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | INTRUSION-DETECTION SYSTEMS | DDOS ATTACKS | CHALLENGES | Computer science
Journal Article
2014, 1, ISBN 9781623564568, xv, 168
"This book examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is... 
Denial of service attacks | Internet | Hacktivism | Political aspects | Civil disobedience | Cyberspace | SOCIAL SCIENCE / Media Studies
Book
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 04/2017, Volume 25, Issue 2, pp. 1206 - 1219
Journal Article
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 12/2012, Volume 20, Issue 6, pp. 1828 - 1841
Journal Article
IEEE Transactions on Control Systems Technology, ISSN 1063-6536, 05/2016, Volume 24, Issue 3, pp. 843 - 852
Journal Article
IEEE Transactions on Automatic Control, ISSN 0018-9286, 10/2015, Volume 60, Issue 10, pp. 2831 - 2836
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor node communicates with a remote estimator through a wireless... 
Game Theory | DoS Jamming Attack | Games | Markov Chain | Nash equilibrium | Linear programming | Cyber-Physical Systems | Jamming | Computer crime | State estimation | Remote State Estimation | Decision-making | Usage | Analysis | Markov processes | Research | Computer crimes | Remote sensors | Interactive | Strategy | Sensors | Game theory | Channels | Optimization
Journal Article
IEEE Transactions on Automatic Control, ISSN 0018-9286, 11/2015, Volume 60, Issue 11, pp. 3023 - 3028
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given... 
Wireless communication | Schedules | Estimation error | Wireless sensor networks | Channel estimation | DoS attack | energy constraint | Computer crime | State estimation | Mobile communication systems | Wireless communication systems | Research | Data security | Analysis | Network security | Intrusion detection systems | Remote sensors | Intrusion | Sensors | Sampling | Estimators | Channels | Optimization
Journal Article
Computers & Security, ISSN 0167-4048, 11/2013, Volume 39, pp. 475 - 485
It is without doubt that the Domain Name System (DNS) is one of the most decisive elements of the Internet infrastructure; even a slight disruption to the... 
DNS | DoS | Cybersecurity | DNSSEC | Amplification attack | Reflection attack | COMPUTER SCIENCE, INFORMATION SYSTEMS | Domain names | Denial of service attacks | Amplification | Networks | Impairment | Malware | Computer information security | Flavours
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2011, Volume 13, Issue 2, pp. 245 - 257
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies,... 
Urban areas | Interference | Access protocols | Communication system security | Computer crime | Jamming | anti-jamming | Wireless DoS | Wireless networks | wireless security | Internet | Communication networks | Protection | jamming | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | SENSOR NETWORKS | Surveys | Networks | Radio signals | Blocking | Jammers | Summaries
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 10/2016, Volume 12, Issue 5, pp. 1786 - 1794
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 07/2017, Volume 21, Issue 7, pp. 1549 - 1552
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency... 
Radio frequency | Receivers | energy harvesting | Throughput | DoS | Batteries | Decoding | Security | Jamming | eavesdropping | TELECOMMUNICATIONS | Probability theory | Radio | Probabilistic methods | Energy harvesting | Electric batteries | Eavesdropping | Splitting | Transmitters | Design improvements | Energy conservation | Randomness | Buffers | Computer security
Journal Article
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 08/2008, Volume 16, Issue 4, pp. 791 - 802
Journal Article
Journal Article
by Su, Lei and Ye, Dan
ISA transactions, ISSN 0019-0578, 05/2019
This paper investigates the observer-based output feedback control problem for cyber-physical systems against randomly occurring packet dropout and periodic... 
Journal Article