EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"DDOS attack"
Narrow search

Narrow search

Year of publication
Subject
All
DDoS Attack 4 Data security 2 Datensicherheit 2 Access Control Lists 1 Anomaly Detection 1 Authentication 1 Authorization 1 Availability 1 Case studies 1 Cloud Data Center 1 Cloud Security 1 Cybersecurity 1 DDOS attack 1 DDoS attack 1 Electronic Banking 1 Electronic banking 1 Entropy Information Theory 1 Fog Computing 1 Graphical Network Simulator 1 Hafen 1 IT crime 1 IT-Kriminalität 1 Ingress Filtering 1 Internet Service Provider 1 Internet of Things 1 Mitigation 1 Mobile Business 1 Mobile business 1 Mobile communications 1 Mobilkommunikation 1 Networks 1 Port 1 Ransomware 1 SQL Injection 1 Seaports 1 Security 1 Simulation 1 Systems 1 Taxonomy 1 Tools 1
more ... less ...
Online availability
All
Undetermined 5
Type of publication
All
Article 6
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2
Language
All
English 6
Author
All
Aridoss, Manimaran 1 Arora, Arushi 1 Bhushan, Kriti 1 Bukkawar, Mrunali 1 Chaudhary, Deepali 1 El Janati El Idrissi, Noreddine 1 Gupta, B.B. 1 Kouraogo, Yacouba 1 Orhanou, Ghizlane 1 Pathan, Mohd. Shafi 1 Senarak, Chalermpong 1 Sharma, Kavita 1 Yadav, Sumit Kumar 1 Zkik, Karim 1
more ... less ...
Published in...
All
International Journal of E-Services and Mobile Applications (IJESMA) 1 International Journal of Handheld Computing Research (IJHCR) 1 International Journal of Information System Modeling and Design (IJISMD) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of intelligent enterprise : IJIE 1 Maritime economics & logistics 1
Source
All
Other ZBW resources 4 ECONIS (ZBW) 2
Showing 1 - 6 of 6
Cover Image
Port cyberattacks from 2011 to 2023 : a literature review and discussion of selected cases
Senarak, Chalermpong - In: Maritime economics & logistics 26 (2024) 1, pp. 105-130
Persistent link: https://www.econbiz.de/10014507751
Saved in:
Cover Image
Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing
Chaudhary, Deepali; Bhushan, Kriti; Gupta, B.B. - In: International Journal of E-Services and Mobile … 10 (2018) 3, pp. 61-83
the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how …
Persistent link: https://www.econbiz.de/10012044750
Saved in:
Cover Image
Security Integration in DDoS Attack Mitigation Using Access Control Lists
Sharma, Kavita; Yadav, Sumit Kumar; Arora, Arushi - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 56-76
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the...
Persistent link: https://www.econbiz.de/10012045658
Saved in:
Cover Image
Security model on mobile banking application : attack simulation and countermeasures
Kouraogo, Yacouba; Zkik, Karim; El Janati El Idrissi, … - In: International journal of intelligent enterprise : IJIE 4 (2017) 1/2, pp. 155-167
Persistent link: https://www.econbiz.de/10011858931
Saved in:
Cover Image
Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications
Aridoss, Manimaran - In: International Journal of Handheld Computing Research (IJHCR) 8 (2017) 4, pp. 40-51
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed...
Persistent link: https://www.econbiz.de/10012045180
Saved in:
Cover Image
Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks
Pathan, Mohd. Shafi; Bukkawar, Mrunali - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 1, pp. 60-72
There has been a huge development in how to read a data from sensor device such as infrared (IR) device, temperature device, etc. Sensor data collection has wide issues of information security. Information security is also the current topic of discussion due to its use in application in various...
Persistent link: https://www.econbiz.de/10012047569
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...