X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1744) 1744
Conference Proceeding (891) 891
Newspaper Article (431) 431
Newsletter (179) 179
Magazine Article (170) 170
Trade Publication Article (106) 106
Publication (79) 79
Book Chapter (54) 54
Dissertation (52) 52
Book / eBook (26) 26
Government Document (15) 15
Reference (5) 5
Transcript (4) 4
Web Resource (4) 4
Report (3) 3
Book Review (1) 1
Paper (1) 1
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
denial of service attacks (2173) 2173
denial of service (572) 572
network security (477) 477
computer crime (466) 466
security (451) 451
internet (418) 418
networks (378) 378
computer security (339) 339
computer information security (315) 315
computer science, information systems (296) 296
telecommunications (294) 294
wireless networks (269) 269
servers (263) 263
engineering, electrical & electronic (242) 242
algorithms (220) 220
denial-of-service (212) 212
analysis (187) 187
methods (186) 186
authentication (179) 179
data security (173) 173
dos (169) 169
protocols (163) 163
studies (161) 161
safety and security measures (155) 155
computer networks (154) 154
computer science (153) 153
ad hoc networks (150) 150
cloud computing (147) 147
denial of service attack (147) 147
computer science, hardware & architecture (138) 138
computer simulation (135) 135
intrusion detection (134) 134
patents (133) 133
security management (131) 131
wireless sensor networks (127) 127
floods (123) 123
denial-of-service attack (121) 121
ip networks (121) 121
sensors (119) 119
inventors (116) 116
routing (116) 116
ddos (115) 115
protocol (115) 115
mathematical models (113) 113
intrusion (110) 110
research (107) 107
distributed denial of service (104) 104
traffic flow (103) 103
computer science, theory & methods (98) 98
control (96) 96
cryptography (91) 91
conferences (89) 89
mobile communication systems (87) 87
ip (83) 83
ip traceback (83) 83
computer science, software engineering (82) 82
reports (82) 82
denial-of-service attacks (81) 81
jamming (81) 81
bandwidth (80) 80
control systems (80) 80
dos-attacke (80) 80
traffic engineering (80) 80
usage (80) 80
remote sensors (79) 79
computer communication networks (78) 78
monitoring (78) 78
software (76) 76
web sites (73) 73
wireless communication (73) 73
simulation (71) 71
internet of things (70) 70
access control (67) 67
attacks (66) 66
data encryption (66) 66
dos attacks (66) 66
tcp (65) 65
engineering (64) 64
flooding (64) 64
information technology (62) 62
cyberterrorism (61) 61
privacy (61) 61
intellectual property (59) 59
management (59) 59
communications engineering, networks (58) 58
prevention (58) 58
classification (57) 57
intrusion detection systems (57) 57
dos attack (56) 56
infrastructure (56) 56
computers (54) 54
telecommunication traffic (54) 54
anomaly detection (53) 53
availability (53) 53
delay (53) 53
routers (53) 53
computer viruses (52) 52
routing protocols (52) 52
automation & control systems (51) 51
intrusion detection system (50) 50
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (21) 21
Collection Dvlpm't (Acquisitions) - Vendor file (3) 3
St. Michael's College (John M. Kelly) - 2nd Floor (3) 3
UTL at Downsview - May be requested (2) 2
UofT at Mississauga - Stacks (2) 2
UofT at Scarborough - Stacks (2) 2
Faculty of Information - Stacks (1) 1
Gerstein Science - Stacks (1) 1
Holland Bloorview Kids Rehabilitation - Stacks (1) 1
OISE - Lost (1) 1
Online Resources - Online (1) 1
Trinity College (John W Graham) - Storage (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3226) 3226
Chinese (67) 67
Japanese (28) 28
French (12) 12
Portuguese (6) 6
German (5) 5
Korean (4) 4
Spanish (2) 2
Arabic (1) 1
Indonesian (1) 1
Italian (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Automatic Control, ISSN 0018-9286, 12/2015, Volume 60, Issue 12, pp. 3299 - 3304
We consider the problem of risk-sensitive stochastic control under a Markov modulated denial-of-service (DoS) attack strategy in which the attacker, using a... 
information-state | Density measurement | measure transformations | Optimal control | Hidden Markov models | Markov processes | Random variables | risk-sensitive control | Mathematical model | Computer crime | Denial-of-service | SYSTEMS | AUTOMATION & CONTROL SYSTEMS | ENTROPY | ENGINEERING, ELECTRICAL & ELECTRONIC | Usage | Mathematical models | Stochastic systems | Analysis
Journal Article
Advanced Science Letters, ISSN 1936-6612, 10/2018, Volume 24, Issue 10, p. 7446
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectivity on the Internet. Nowadays, attack detection strategies... 
Intrusion | Defense programs | Denial of service attacks | Damage detection | Neural networks | Machine learning | Back propagation | Research projects | Computer networks | Computer security | Expert systems
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 08/2017, Volume 91, pp. 1 - 13
A malicious attack that can prevent establishment of Internet connections to web servers is termed as a Denial of Service (DoS) attack; volume and intensity of... 
Machine learning techniques | Traffic analysis | Denial of Service attack | HTTP/2 | COMPUTER SCIENCE, SOFTWARE ENGINEERING | DEFENSE | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | CLASSIFICATION | Denial of service attacks | Models | Analysis | Machine learning
Journal Article
International Journal of Electronics, ISSN 0020-7217, 06/2017, Volume 104, Issue 6, pp. 993 - 1007
Journal Article
AD HOC & SENSOR WIRELESS NETWORKS, ISSN 1551-9899, 2018, Volume 42, Issue 1-2, pp. 35 - 61
Smart technologies have seeped into every aspect of human communication. The increase in population has escalated the number of vehicles on road as well as... 
intelligent transport systems (ITS) | sybil | Vehicular ad hoc networks | vanets | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | denial of service attack (DSO) | malicious attack | TELECOMMUNICATIONS | inter vehicular communication system (IVS) | SYBIL ATTACKS
Journal Article
Computer Networks, ISSN 1389-1286, 2007, Volume 51, Issue 12, pp. 3564 - 3573
Journal Article
IEEE Transactions on Control Systems Technology, ISSN 1063-6536, 05/2016, Volume 24, Issue 3, pp. 843 - 852
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 01/2015, Volume 28, Issue 2, pp. 309 - 324
SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as... 
FFUCA | LEACH | WSN | DoS attack | SECURITY | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Wireless sensor networks | Denial of service attacks | Algorithms | Sensors | Analysis | Remote sensors | Wireless networks | Mathematical models | Flooding | Clustering
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 10/2016, Volume 12, Issue 5, pp. 1786 - 1794
Journal Article
International Journal of Advanced Networking and Applications, ISSN 0975-0290, 09/2015, Volume 7, Issue 2, p. 2674
  Wireless Sensor Network are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and... 
Datasets | Network security | Denial of service attacks | Sensors | Intrusion detection systems
Journal Article
Neurocomputing, ISSN 0925-2312, 05/2019
Journal Article
World Academy of Science, Engineering and Technology, ISSN 2010-376X, 05/2010, Volume 65, pp. 411 - 415
Journal Article
2011, ISBN 8132217136, 357
DoS attacks are now so pervasive that virtually any computer connected to a network is vulnerable. This book offers insights into the complexity of the problem... 
Computer security | Clinical & internal medicine | Denial of service attacks | Computer networks | Internet | Government policy | Security measures | Systems and Data Security | Input/Output and Data Communications | Computer Science | Control Structures and Microprogramming
eBook
International Journal of Computer Applications, ISSN 0975-8887, 01/2014, Volume 86, Issue 8
  Vehicular ad hoc network (VANET) is an important component of Intelligent Transportation Systems. In VANET, active safety systems is seems as the main... 
Availability | Networks | Denial of service attacks | Messages | Ad hoc networks | Safety | Computer information security | Vehicles
Journal Article
IEEE Transactions on Neural Networks and Learning Systems, ISSN 2162-237X, 10/2019, Volume 30, Issue 10, pp. 3137 - 3149
Journal Article
IEEE Transactions on Neural Networks and Learning Systems, ISSN 2162-237X, 06/2019, Volume 30, Issue 6, pp. 1695 - 1704
Journal Article
IEEE Transactions on Cybernetics, ISSN 2168-2267, 12/2019, Volume 49, Issue 12, pp. 4271 - 4281
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.