Keywords: Virtual machine; Live migration; Three-way handshake; NAT; DDoS; 00-01; 99-00;
مقالات ISI (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: Industrial internet of things; Cybersecurity; Network and information security; Data protection; Smart grids; Industrial control systems; Autonomous vehicles; APTs; advanced persistent threats; CPS; cyber physical systems; C&Cs; command and control server
Keywords: Outage; Large-scale outages; Internet outages; Fault; Detection; Resilience; Earthquake; Tsunami; Hurricane; Cable cut; DDoS; Network attack; Security; Outage impact; Mitigation; Risk assessment; Survey;
Keywords: 3G; Third generation; 3GPP; 3rd Generation Partnership Project; 5G; Fifth generation; AN; Artificial noise; BER; Bit error rate; BS; Base station; CoAP; Constrained Application Protocol; CR; Cognitive Radios; CSI; Channel state information; D2D; Device to
Keywords: DDoS; Incomplete transaction; IP spoofing; Next generation network; Retransmission; SIP; SIP security; Unified communication; VoIP; VoIP security;
Keywords: DDoS; DRDoS; DNS; Darknet; Cyber threats
Keywords: DDoS; Covert channel; SIP; Network steganography
CoreFlow: Enriching Bro security events using network traffic monitoring data
Keywords: Security; Network; IDS; Netflow; Flow; Detection; IPFIX; DDoS; Carrier networks; Transit networks;
A Bayesian change point model for detecting SIP-based DDoS attacks
Keywords: VoIP security; SIP; DDoS; Simulation; Bayesian change point models;
Woodpecker: Detecting and mitigating link-flooding attacks via SDN
Keywords: Link-flooding attack; DDoS; Software-defined networking;
An intelligent cyber security system against DDoS attacks in SIP networks
Keywords: Anomaly detection; Malicious user detection; DDoS; Mahalanobis distances; Sequence alignment kernel;
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
Keywords: DDoS; Detection; Flash events; Network security; Review;
A new method to reduce the effects of HTTP-Get Flood attack
Keywords: DDOS; HTTP-GET flood attacks; IOSEC;
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
Keywords: Denial-of-service attacks; Application layer; Sampling techniques; Intrusion detection; DDoS; Network security;
Trends in Validation of DDoS Research
Keywords: DDoS; Intrusion; Flash Events; Datasets; Network Security
A distributed filtering mechanism against DDoS attacks: ScoreForCore
Keywords: DDoS; DoS; Filter; Internet security; Intrusion detection and prevention systems; Traffic filtering;
Evaluation of TFTP DDoS amplification attack
Keywords: DDoS; Amplification attack; DoS; Network flood; DDoS evaluation;
Detecting DDoS attacks against data center with correlation analysis
Keywords: Data center; DDoS; K-nearest neighbor; Correlation
SF-DRDoS: The store-and-flood distributed reflective denial of service attack
Keywords: DDoS; DRDoS; Amplification factor; Kademlia; Store-and-flood
Deceiving entropy based DoS detection
Keywords: Entropy; Detection deceiving; Denial of service; DDoS; Intrusion detection; Protocol spoofing
OPERETTA: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers
Keywords: OpenFlow; DDoS; SDN
A moving target DDoS defense mechanism
Keywords: DDoS; Moving target defense; Secret proxy; Insider; Shuffling
An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
Keywords: Network security; Data mining; DDoS; Vehicular network; Web of Things; Association rule mining
A game theoretic defence framework against DoS/DDoS cyber attacks
Keywords: DoS; DDoS; Game theory; Network security; Defence mechanism; Firewall
On the exploitation of CDF based wireless scheduling
Keywords: Wireless; CDF; Scheduling; Fairness; DDoS; Attack
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
Keywords: DDoS; Neuro-fuzzy; Neural networks; Machine learning; Ensemble of classifiers
Botnets: A survey
Keywords: Botnet; Bot; Malware; DDoS; Botnet detection; Network security
Feature evaluation for web crawler detection with data mining techniques
Keywords: Web crawler detection; Web server access logs; Data mining; Classification; DDoS; WEKA;
DDoS flooding attack detection scheme based on F-divergence
Keywords: DDoS; Flash crowd; F-divergence; Total variation distance; Entropy
Flow level detection and filtering of low-rate DDoS
Keywords: DDoS; Detection; Low-rate DoS; Congestion;
A new multistage approach to detect subtle DDoS attacks
Keywords: DDoS; Network security; DDoS attack model; Clustering; Wavelet-based singularity detection; Network Traffic State
Analyzing well-known countermeasures against distributed denial of service attacks
Keywords: Distributed denial of service attacks; DDoS; Flooding attacks; Countermeasures; Network security
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Keywords: Network security; DDoS; XDoS; HDoS; Cloud computing; Traceback
Distributed denial of service attack detection using an ensemble of neural classifier
Keywords: DDoS; Collaborative environmet; Ensemble of neural networks; Machine learning
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies
Keywords: DDoS; DoS; Grid; E-DGIDE; Autonomous network management unit; Intrusion detection system; Fault tolerance
Survey of network security systems to counter SIP-based denial-of-service attacks
Keywords: Anomaly; DDoS; Detection; DoS; Flooding; IMS; Mitigation; RTP; Signature; VoIP
Preventing DDoS attacks on internet servers exploiting P2P systems
Keywords: P2P; DDoS; Membership validation; Experimental evaluation
DDoS attack detection method using cluster analysis
Keywords: DDoS; Proactive detection; Security; Cluster analysis
Defending against spoofed DDoS attacks with path fingerprint
Keywords: Network security; Intrusion detection; DDoS; IP spoofing;