نتایج جستجو برای: dos

تعداد نتایج: 127092  

2011
Rajagopalan Vijayasarathy Serugudi Venkataraman Raghavan Balaraman Ravindran

Denial of Service(DoS) attacks pose a big threat to any electronic society. DoS and DDoS attacks are catastrophic particularly when applied to highly sensitive targets like Critical Information Infrastructure. While research literature has focussed on using various fundamental classifier models for detecting attacks, the common trend observed in literature is to classify DoS attacks into the br...

Journal: :IJCOPI 2012
Lidia Prudente Tixteco Eleazar Aguirre A. Alba F. Moreno Hdez. Ruben J. García V.

DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...

2014
Kuruvilla Mathew

1.1 Related Works .................................................................................................................... 2 1.2 Introduction ....................................................................................................................... 3 1.3 About Information Systems and Security and Applicable Areas ......................................... 4 1.3.1 The Bas...

2013
Gustavo S. Garbellini Carolina V. Uliana Hideko Yamanaka

Eletrodo de diamante foi usado para avaliar a interação dos nucleotídeos guanosina monofosfato (GMP) e adenosina monofosfato (AMP) com os pesticidas clorpirifós, metamidofós e monocrotofós. Observaram-se alterações nas correntes e potenciais de picos dos voltamogramas dos nucleotídeos na presença dos pesticidas dependendo da concentração de pesticida (de 5,0 × 10 a 5,0 × 10 mol L) e do tempo de...

Journal: :Microelectronics Reliability 2016
Mingzhi Dai

Article history: Received 15 February 2015 Received in revised form 2 December 2015 Accepted 3 December 2015 Available online 23 March 2016 The modeling of the transient subgap density of states (DOS) for the investigation of trap densities in the oxidebased thin-film transistors is proposed. The study is based on both transient measurements and physical modeling. In history, the subgap DOS mod...

Journal: :Int. Journal of Network Management 2005
Yuh-Min Tseng

Malicious intruders may launch as many invalid requests as possible without establishing a server connection to bring server service to a standstill. This is called a denial-of-service (DoS) or distributed DoS (DDoS) attack. Until now, there has been no complete solution to resisting a DoS/DDoS attack. Therefore, it is an important network security issue to reduce the impact of a DoS/DDoS attac...

2003
Natasha Shah Albert E. Cerussi Dorota Jakubowski David Hsiang John Butler Bruce J. Tromberg

Diffuse optical spectroscopy (DOS) of breast tissue provides quantitative, functional information based on optical absorption and scattering properties that cannot be obtained with other radiographic methods. DOS-measured absorption spectra are used to determine the tissue concentrations of deoxyhemoglobin (Hb-R), oxyhemoglobin (Hb-O2), lipid, and water (H2O), as well as to provide an index of ...

2006
Chibiao Liu

In recent years, Wireless Voice over IP (WVoIP) has been one of the most popular telecommunication technologies. Quality of Service (QoS) and security are two important issues which determine the success of WVoIP. WVoIP QoS issues have been extensively studied. However, security issues of WVoIP are rarely addressed. In this paper, we study one important WVoIP security issue of Denial of Service...

Journal: :IJSN 2006
Jing Deng Richard Han Shivakant Mishra

Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs are especially vulnerable to DoS attacks. This paper addresses a particular class of DoS attacks that overwhelm resources along a multihop data delivery path. Since WSNs are typically tree-structured, then a DoS attack on...

2011
Z. H. Pang G. P. Liu

This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the netwo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید