A multi-vocal review of security orchestration
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …
vendors provide security solutions developed using heterogeneous technologies and …
Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …
different locations, that is why many companies and organizations implement their …
[PDF][PDF] Distributed denial of service attacks: a review
SS Sahu, M Pandey - … Journal of Modern Education and Computer …, 2014 - mecs-press.net
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed
autonomous devices using sensors to monitor physical or environmental conditions. WSN is …
autonomous devices using sensors to monitor physical or environmental conditions. WSN is …
Distributed persistent identifiers system design
The need to identify both digital and physical objects is ubiquitous in our society. Past and
present persistent identifier (PID) systems, of which there is a great variety in terms of …
present persistent identifier (PID) systems, of which there is a great variety in terms of …
Study of intrusion detection system for DDoS attacks in cloud computing
The cloud computing has grown as a promising business concept as well as one of the
fastest growing segment of IT industry in the last few years. However the popularity of Cloud …
fastest growing segment of IT industry in the last few years. However the popularity of Cloud …
Cyberattacks detection through behavior analysis of internet traffic
Network intrusion detection systems (NIDS) are actually used to detect suspicious activities
such as viruses, shellcode, XSS, CSRF, worms, etc. There are two types of the NIDS …
such as viruses, shellcode, XSS, CSRF, worms, etc. There are two types of the NIDS …
[PDF][PDF] A prevention of DDoS attacks in Cloud using NEIF techniques
J Rameshbabu, BS Balaji, RW Daniel… - international journal of …, 2014 - Citeseer
In recent years, most of the organizations in the world have increasingly realized the
importance of cloud platforms. The cloud computing is one of the developing segmenting of …
importance of cloud platforms. The cloud computing is one of the developing segmenting of …
[PDF][PDF] A DoS/DDoS attack detection system using chi-square statistic approach
FY Leu, IL Lin - J. Syst. Cybern. Inform, 2010 - iiisci.org
Nowadays, users can easily access and download network attack tools, which often provide
friendly interfaces and easily operated features, from the Internet. Therefore, even a naive …
friendly interfaces and easily operated features, from the Internet. Therefore, even a naive …
Preventing the flood: Incentive-based collaborative mitigation for drdos attacks
A Bremler-Barr, M Sabag - 2022 IFIP Networking Conference …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks, especially distributed reflection denial of
service attacks (DRDoS), have increased dramatically in frequency and volume in recent …
service attacks (DRDoS), have increased dramatically in frequency and volume in recent …
Curbing distributed denial of service attack by traffic filtering in wireless sensor network
SS Sahu, P Priyadarshini… - … Conference on Computing …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of
numerous researchers because of their various applications. They are resource constrained …
numerous researchers because of their various applications. They are resource constrained …