نتایج جستجو برای: dos response
تعداد نتایج: 1103583 فیلتر نتایج به سال:
In the networking systems the flow of information is the most important service. It is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threats like Denial-of-Service (DoS), we need to build an early detection system that can detect the presence of a worm in the Internet as quickly as possible in ...
We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...
fluorescence chemical sensors for the highly sensitive and selective determination of pb2+ , hg2+, co2+ and fe3+ ions in aqueous solutions are described. the ion sensing system was prepared by incorporating lipophilic ligand (l) as a neutral ion-selective fluoroionophore in the plasticized pvc membrane containing sodium tetraphenylborate or potasium tetrakis (p-chlorophenyl) borate as a liphoph...
In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.
The Stream Control Transport Protocol (SCTP) is a new transport layer protocol that has been designed to provide reliable transport over the Internet. While the Transport Control Protocol (TCP) is the most popular transport protocol for the Internet, it falls short with regard to security, more specifically resilience to Denial-of-Service (DoS) attacks, such as SYN attacks. The need for resilie...
We consider the effect of Coulomb interactions on the average density of states (DOS) of disordered low-dimensional metals for temperatures T and frequencies ω smaller than the inverse elastic life-time 1/τ0. Using the fact that long-range Coulomb interactions in two dimensions (2d) generate ln singularities in the DOS ν(ω) but only ln-singularities in the conductivity σ(ω), we can re-sum the m...
In underwater acoustic networks (UANs), due to the unique characteristics of acoustic modems such as long preambles and extremely low transmission rates, contentions are usually costly. As a result, both random access and handshake based MAC protocols do not perform as well as expected. A collisionfree approach is therefore considered to more likely achieve a better performance. Following this ...
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and accessibility to the Internet is also posing a serious threat to security and privacy, to individuals, organizations, and nations alike. Finding effective ways to detect, prevent, and respond to intrusions and hacker atta...
Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security measures for the cloud. One of the largest security obstacles is how to defend against a De...
0. Abstract. PC Beta is a PC oriented tool for corpus work in this term's broadest possible sense. With PC Beta one can prepare texts for corpus work, e.g. standardize texts in different ways (very important when texts from different sources together will constitute a corpus), one can process texts, and one can analyze texts. Making ordinary concordances and similar things with PC Beta is, of c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید