نتایج جستجو برای: dos

تعداد نتایج: 127092  

1999
M. Schreiber

We consider a tight-binding Hamiltonian defined on the quasiperiodic Ammann-Beenker tiling. Although the density of states (DOS) is rather spiky, the integrated DOS (IDOS) is quite smooth and can be used to perform spectral unfolding. The effect of unfolding on the integrated level-spacing distribution is investigated for various parts of the spectrum which show different behaviour of the DOS. ...

2008
Xin Liu Xiaowei Yang Yanbin Lu

This paper presents the design and implementation of a filter-based DoS defense system (StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the StopIt design is a novel closed-control, open-service architecture: any receiver can use StopIt to block the undesired traffic it receives, yet the design is robust to various strategic attacks from millions of bo...

1998
TheoryM. Schreiber U. Grimm X. Zhong

We consider a tight-binding Hamiltonian deened on the quasiperi-odic Ammann-Beenker tiling. Although the density of states (DOS) is rather spiky, the integrated DOS (IDOS) is quite smooth and can be used to perform spectral unfolding. The eeect of unfolding on the integrated level-spacing distribution is investigated for various parts of the spectrum which show diierent behaviour of the DOS. Fo...

2016
Ran Tao

Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...

2009
D. W. Park

This paper analyzes the DoS attack traffic on the WiBro network, generates logs and tracebacks the attacker. With attaining the integrity against the packets resulted from the malicious DoS attack, the paper provides the framework to generating forensic data. In the WiBro network environment, the attacker and the victim are the WiBro mobile terminal. The packet analyzers(Cain & Abel, Wireshark ...

2018
Jie Liu Tiantian Yu Juntao Song

We study theoretically the local density of states (DOS) in a topological Josephson junction. We show that the well-known 4π Josephson effect originates from the interference effect between two Majorana fermions (MFs) that are localized at the Josephson junction. In addition, the DOS for electrons (holes) shows the 4π interference information along each parity conserved energy spectrum. The DOS...

2012
A. Prathap R. Sailaja

In the networking systems the flow of information is the most important service. It is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threats like Denial-of-Service (DoS), we need to build an early detection system that can detect the presence of a worm in the Internet as quickly as possible in ...

2010
Amir Herzberg Haya Shulman

We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...

Journal: :Annales UMCS, Informatica 2012
Urszula Krawczyk Piotr Sapiecha

In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.

2006
Inwhee Joe

The Stream Control Transport Protocol (SCTP) is a new transport layer protocol that has been designed to provide reliable transport over the Internet. While the Transport Control Protocol (TCP) is the most popular transport protocol for the Internet, it falls short with regard to security, more specifically resilience to Denial-of-Service (DoS) attacks, such as SYN attacks. The need for resilie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید