Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Denial of service). Showing records 1 – 30 of 197 total matches.

[1] [2] [3] [4] [5] [6] [7]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of North Texas

1. Jensen, David. Ddos Defense Against Botnets in the Mobile Cloud.

Degree: 2014, University of North Texas

 Mobile phone advancements and ubiquitous internet connectivity are resulting in ever expanding possibilities in the application of smart phones. Users of mobile phones are now… (more)

Subjects/Keywords: Denial of service; Botnet; mobile

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jensen, D. (2014). Ddos Defense Against Botnets in the Mobile Cloud. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc500027/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Thesis, University of North Texas. Accessed January 24, 2021. https://digital.library.unt.edu/ark:/67531/metadc500027/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Web. 24 Jan 2021.

Vancouver:

Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Internet] [Thesis]. University of North Texas; 2014. [cited 2021 Jan 24]. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

2. Johansson, Marcus. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.

Degree: 2015, Luleå University of Technology

Distributed Denial of Service (DDoS) is today a commonly seen computer network attack with the purpose of disrupting various services. This is often achieved… (more)

Subjects/Keywords: Technology; DDOS; DOS; Distributed Denial of Service; Denial of Service; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johansson, M. (2015). Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Thesis, Luleå University of Technology. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Web. 24 Jan 2021.

Vancouver:

Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Internet] [Thesis]. Luleå University of Technology; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Thesis]. Luleå University of Technology; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

3. Moorthy M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.

Degree: Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks, 2015, Anna University

The need for developing a hybrid intrusion detection system has newlinebecome an essential part in implementing the security for a network Today s newlinenetwork suffers… (more)

Subjects/Keywords: Denial of Service; local area networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

M, M. (2015). Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/34200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Web. 24 Jan 2021.

Vancouver:

M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Carolina University

4. Fu, Tian. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.

Degree: 2012, East Carolina University

 Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of… (more)

Subjects/Keywords: Wireless LANs; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, T. (2012). MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333

Chicago Manual of Style (16th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Masters Thesis, East Carolina University. Accessed January 24, 2021. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.

MLA Handbook (7th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Web. 24 Jan 2021.

Vancouver:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2021 Jan 24]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.

Council of Science Editors:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333


Rutgers University

5. Gawande, Arpit Ramesh, 1986-. DDoS detection and mitigation using machine learning.

Degree: MS, Computer Science, 2018, Rutgers University

 Distributed Denial of Service (DDoS) attacks are very common nowadays. It is evident that the current industry solutions, such as completely relying on the In-… (more)

Subjects/Keywords: Machine learning; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gawande, Arpit Ramesh, 1. (2018). DDoS detection and mitigation using machine learning. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57074/

Chicago Manual of Style (16th Edition):

Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Masters Thesis, Rutgers University. Accessed January 24, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.

MLA Handbook (7th Edition):

Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Web. 24 Jan 2021.

Vancouver:

Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2021 Jan 24]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.

Council of Science Editors:

Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/


Queensland University of Technology

6. Bhatia, Sajal. Detecting distributed Denial-of-Service attacks and Flash Events.

Degree: 2013, Queensland University of Technology

 This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines… (more)

Subjects/Keywords: Denial-of-Service; Distributed Denial-of-Service; Flash Events; Synthetic Traffic Generation; Modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhatia, S. (2013). Detecting distributed Denial-of-Service attacks and Flash Events. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/62031/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/62031/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Web. 24 Jan 2021.

Vancouver:

Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/62031/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/62031/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

7. Tritilanunt, Suratose. Protocol engineering for protection against denial-of-service attacks.

Degree: 2009, Queensland University of Technology

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in… (more)

Subjects/Keywords: denial of service attacks; denial of service resistance; key establishment proto- cols; Host Identity Protocol (HIP); Meadows' cost-based framework; Coloured Petri Nets; CPN Tools; denial of service modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tritilanunt, S. (2009). Protocol engineering for protection against denial-of-service attacks. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/26277/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tritilanunt, Suratose. “Protocol engineering for protection against denial-of-service attacks.” 2009. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/26277/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tritilanunt, Suratose. “Protocol engineering for protection against denial-of-service attacks.” 2009. Web. 24 Jan 2021.

Vancouver:

Tritilanunt S. Protocol engineering for protection against denial-of-service attacks. [Internet] [Thesis]. Queensland University of Technology; 2009. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/26277/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tritilanunt S. Protocol engineering for protection against denial-of-service attacks. [Thesis]. Queensland University of Technology; 2009. Available from: https://eprints.qut.edu.au/26277/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vanderbilt University

8. Emfinger, William Alexander. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.

Degree: PhD, Electrical Engineering, 2015, Vanderbilt University

 Cyber-Physical Systems (CPS) are becoming increasingly distributed in nature. These distributed systems interact closely with the physical world and require the use of communications channels… (more)

Subjects/Keywords: prediction; performance; systems; physical; network; real-time; embedded; analysis; cyber; spacecraft; denial of service; distributed denial of service; calculus

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Emfinger, W. A. (2015). Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14549

Chicago Manual of Style (16th Edition):

Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Doctoral Dissertation, Vanderbilt University. Accessed January 24, 2021. http://hdl.handle.net/1803/14549.

MLA Handbook (7th Edition):

Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Web. 24 Jan 2021.

Vancouver:

Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Internet] [Doctoral dissertation]. Vanderbilt University; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1803/14549.

Council of Science Editors:

Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Doctoral Dissertation]. Vanderbilt University; 2015. Available from: http://hdl.handle.net/1803/14549

9. Andersen, Jonas Skog. Denial-of-service attack : A realistic implementation of a DoS attack.

Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University

  This report describes some of the most well known denial of service attacks (DoS-attacks). This will be done in the first part of the… (more)

Subjects/Keywords: DOS; DDOS; Attack; Denial of Service; Distributed denial of service attack; HTTP POST; HTTP POST attack; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersen, J. S. (2015). Denial-of-service attack : A realistic implementation of a DoS attack. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Thesis, Linköping UniversityLinköping University. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Web. 24 Jan 2021.

Vancouver:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

10. Wassihun, Beyene. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .

Degree: 2020, Addis Ababa University

 Telecom service providers operate and control complex network infrastructure used for data transmission. However, security issues have been among the most serious problems for service(more)

Subjects/Keywords: Adaptive Booster; ANN; Distributed denial of service attack; Denial of service attack; Hping3; J48; Naive Bayes; SYN flood attack; WEKA; Wireshark

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wassihun, B. (2020). Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/handle/123456789/21113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wassihun, Beyene. “Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .” 2020. Thesis, Addis Ababa University. Accessed January 24, 2021. http://etd.aau.edu.et/handle/123456789/21113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wassihun, Beyene. “Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .” 2020. Web. 24 Jan 2021.

Vancouver:

Wassihun B. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . [Internet] [Thesis]. Addis Ababa University; 2020. [cited 2021 Jan 24]. Available from: http://etd.aau.edu.et/handle/123456789/21113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wassihun B. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . [Thesis]. Addis Ababa University; 2020. Available from: http://etd.aau.edu.et/handle/123456789/21113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Andersson, Emil. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.

Degree: 2012, , Faculty of Technology and Society (TS)

Internetfenomenet ”Distributed Denial of Service”, förkortat DDoS, beskrivs ofta som ett av de största hoten mot Internet idag. Genom att utnyttja den grundläggande strukturen… (more)

Subjects/Keywords: DDoS; DoS; Distributed Denial of Service; Denial of Service; HTTP-GET-DoS; TCP-SYN-Flood; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersson, E. (2012). DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. (Thesis). , Faculty of Technology and Society (TS). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersson, Emil. “DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.” 2012. Thesis, , Faculty of Technology and Society (TS). Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersson, Emil. “DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.” 2012. Web. 24 Jan 2021.

Vancouver:

Andersson E. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. [Internet] [Thesis]. , Faculty of Technology and Society (TS); 2012. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersson E. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. [Thesis]. , Faculty of Technology and Society (TS); 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Columbia University

12. Yang, Yudong. Transparently Improving Quality of Service of Modern Applications.

Degree: 2019, Columbia University

 Improving end-to-end Quality of Service (QoS) in existing network systems is a fundamental problem, as it can be affected by many factors, including congestion, packet… (more)

Subjects/Keywords: Computer science; Quality of service (Computer networks); Cloud computing; Wireless Internet; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Y. (2019). Transparently Improving Quality of Service of Modern Applications. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/d8-fvfm-yg67

Chicago Manual of Style (16th Edition):

Yang, Yudong. “Transparently Improving Quality of Service of Modern Applications.” 2019. Doctoral Dissertation, Columbia University. Accessed January 24, 2021. https://doi.org/10.7916/d8-fvfm-yg67.

MLA Handbook (7th Edition):

Yang, Yudong. “Transparently Improving Quality of Service of Modern Applications.” 2019. Web. 24 Jan 2021.

Vancouver:

Yang Y. Transparently Improving Quality of Service of Modern Applications. [Internet] [Doctoral dissertation]. Columbia University; 2019. [cited 2021 Jan 24]. Available from: https://doi.org/10.7916/d8-fvfm-yg67.

Council of Science Editors:

Yang Y. Transparently Improving Quality of Service of Modern Applications. [Doctoral Dissertation]. Columbia University; 2019. Available from: https://doi.org/10.7916/d8-fvfm-yg67


Rochester Institute of Technology

13. Winemiller, Nathan. NAT denial of service: An Analysis of translation table behavior on multiple platforms.

Degree: MS, Computer Science (GCCIS), 2011, Rochester Institute of Technology

  Network Address Translation or NAT, is a technology that is used to translate internal addresses to globally routable addresses on the internet. It is… (more)

Subjects/Keywords: Denial of service; NAT; Network address translation; Translation table

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Winemiller, N. (2011). NAT denial of service: An Analysis of translation table behavior on multiple platforms. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/315

Chicago Manual of Style (16th Edition):

Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed January 24, 2021. https://scholarworks.rit.edu/theses/315.

MLA Handbook (7th Edition):

Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Web. 24 Jan 2021.

Vancouver:

Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2021 Jan 24]. Available from: https://scholarworks.rit.edu/theses/315.

Council of Science Editors:

Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/315


Anna University

14. Jayashree, P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.

Degree: 2013, Anna University

The use of e-technologies enables integration of information from various sources and users of Internet increases multifold that leads to severe security concern. The objective… (more)

Subjects/Keywords: Adaptive Multi-tier; distributed denial of service; active networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayashree, P. (2013). An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/13375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Web. 24 Jan 2021.

Vancouver:

Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Internet] [Thesis]. Anna University; 2013. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Thesis]. Anna University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

15. Sandhya M K. Secure data aggregation and forwarding in wireless sensor networks;.

Degree: Secure data aggregation and forwarding in wireless sensor networks, 2015, Anna University

Wireless sensor networks WSNs consist of numerous low power sensor nodes with limited computing ability and storage capacity These sensor nodes sense events from the… (more)

Subjects/Keywords: Data aggregation; Denial of Service; Wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

K, S. M. (2015). Secure data aggregation and forwarding in wireless sensor networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/49404

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

K, Sandhya M. “Secure data aggregation and forwarding in wireless sensor networks;.” 2015. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/49404.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

K, Sandhya M. “Secure data aggregation and forwarding in wireless sensor networks;.” 2015. Web. 24 Jan 2021.

Vancouver:

K SM. Secure data aggregation and forwarding in wireless sensor networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/49404.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

K SM. Secure data aggregation and forwarding in wireless sensor networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/49404

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Anurekha, R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.

Degree: Information and Communication Engineering, 2014, Anna University

A Distributed Denial of Service DDoS attack is an explicit attempt newlineby an attacker to overload the server s or network s with useless traffic… (more)

Subjects/Keywords: Distributed Denial of Service; Information and communication engineering

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anurekha, R. (2014). Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/22192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Web. 24 Jan 2021.

Vancouver:

Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Internet] [Thesis]. Anna University; 2014. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

17. Davis, Michael Reginald. Categorising Network Telescope data using big data enrichment techniques.

Degree: Faculty of Science, Computer Science, 2019, Rhodes University

 Network Telescopes, Internet backbone sampling, IDS and other forms of network-sourced Threat Intelligence provide researchers with insight into the methods and intent of remote entities… (more)

Subjects/Keywords: Denial of service attacks; Big data; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, M. R. (2019). Categorising Network Telescope data using big data enrichment techniques. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/92941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Thesis, Rhodes University. Accessed January 24, 2021. http://hdl.handle.net/10962/92941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Web. 24 Jan 2021.

Vancouver:

Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Internet] [Thesis]. Rhodes University; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10962/92941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Thesis]. Rhodes University; 2019. Available from: http://hdl.handle.net/10962/92941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

18. Kambhampati, Vamsi K. Protecting critical services from DDoS attacks.

Degree: PhD, Computer Science, 2012, Colorado State University

 Critical services such as emergency response, industrial control systems, government and banking systems are increasing coming under threat from Distributed Denial of Service (DDoS) attacks.… (more)

Subjects/Keywords: distributed denial of service; proxies; location hiding; hidden paths

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kambhampati, V. K. (2012). Protecting critical services from DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/67463

Chicago Manual of Style (16th Edition):

Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2012. Doctoral Dissertation, Colorado State University. Accessed January 24, 2021. http://hdl.handle.net/10217/67463.

MLA Handbook (7th Edition):

Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2012. Web. 24 Jan 2021.

Vancouver:

Kambhampati VK. Protecting critical services from DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2012. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10217/67463.

Council of Science Editors:

Kambhampati VK. Protecting critical services from DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/67463


University of Otago

19. Chrobok, Natascha. Receiver Driven Email Delivery .

Degree: 2010, University of Otago

 Spam has become a serious problem to email users all over the world. Most of the daily email messages we are receiving consists of unwanted… (more)

Subjects/Keywords: security; spam prevention; email; distributed denial of service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chrobok, N. (2010). Receiver Driven Email Delivery . (Masters Thesis). University of Otago. Retrieved from http://hdl.handle.net/10523/397

Chicago Manual of Style (16th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Masters Thesis, University of Otago. Accessed January 24, 2021. http://hdl.handle.net/10523/397.

MLA Handbook (7th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Web. 24 Jan 2021.

Vancouver:

Chrobok N. Receiver Driven Email Delivery . [Internet] [Masters thesis]. University of Otago; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10523/397.

Council of Science Editors:

Chrobok N. Receiver Driven Email Delivery . [Masters Thesis]. University of Otago; 2010. Available from: http://hdl.handle.net/10523/397


Deakin University

20. Alajeely, Majeed. Defense and traceback mechanisms in opportunistic wireless networks.

Degree: School of Information Technology, 2015, Deakin University

  In this thesis, we have identified a novel attack in OppNets, a special type of packet dropping attack where the malicious node(s) drops one or… (more)

Subjects/Keywords: Opportunistic networks; Anabolism defence; Denial of service(DOS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alajeely, M. (2015). Defense and traceback mechanisms in opportunistic wireless networks. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30085502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alajeely, Majeed. “Defense and traceback mechanisms in opportunistic wireless networks.” 2015. Thesis, Deakin University. Accessed January 24, 2021. http://hdl.handle.net/10536/DRO/DU:30085502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alajeely, Majeed. “Defense and traceback mechanisms in opportunistic wireless networks.” 2015. Web. 24 Jan 2021.

Vancouver:

Alajeely M. Defense and traceback mechanisms in opportunistic wireless networks. [Internet] [Thesis]. Deakin University; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10536/DRO/DU:30085502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alajeely M. Defense and traceback mechanisms in opportunistic wireless networks. [Thesis]. Deakin University; 2015. Available from: http://hdl.handle.net/10536/DRO/DU:30085502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Deakin University

21. Ahmad, Asma'a. Establishing trust relationships and secure channels in opportunistic networks.

Degree: School of Information Technology, 2017, Deakin University

  An effective system with techniques and algorithms that preserve the completeness and integrity of packets in a network and protects Opportunistic Networks from packet dropping… (more)

Subjects/Keywords: Opportunistic Networks (OppNets); denial of service (DoS) attack; packet dropping

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmad, A. (2017). Establishing trust relationships and secure channels in opportunistic networks. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30103704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ahmad, Asma'a. “Establishing trust relationships and secure channels in opportunistic networks.” 2017. Thesis, Deakin University. Accessed January 24, 2021. http://hdl.handle.net/10536/DRO/DU:30103704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ahmad, Asma'a. “Establishing trust relationships and secure channels in opportunistic networks.” 2017. Web. 24 Jan 2021.

Vancouver:

Ahmad A. Establishing trust relationships and secure channels in opportunistic networks. [Internet] [Thesis]. Deakin University; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10536/DRO/DU:30103704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ahmad A. Establishing trust relationships and secure channels in opportunistic networks. [Thesis]. Deakin University; 2017. Available from: http://hdl.handle.net/10536/DRO/DU:30103704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Notre Dame

22. David A Cieslak. A Clustering Defense Against Distributed Denial of Service Attacks</h1>.

Degree: Computer Science and Engineering, 2006, University of Notre Dame

  Distributed Denial of Service (DDoS) attacks can quickly bring normally effective web services to a screeching halt. While there has been a significant amount… (more)

Subjects/Keywords: Distributed Denial of Service; Clustering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cieslak, D. A. (2006). A Clustering Defense Against Distributed Denial of Service Attacks</h1>. (Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/g732d793z75

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Thesis, University of Notre Dame. Accessed January 24, 2021. https://curate.nd.edu/show/g732d793z75.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Web. 24 Jan 2021.

Vancouver:

Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Internet] [Thesis]. University of Notre Dame; 2006. [cited 2021 Jan 24]. Available from: https://curate.nd.edu/show/g732d793z75.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Thesis]. University of Notre Dame; 2006. Available from: https://curate.nd.edu/show/g732d793z75

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

23. Liu, Zhuotao. FlowPolice: enforcing congestion accountability to defend against DDoS attacks.

Degree: MS, Electrical & Computer Engr, 2015, University of Illinois – Urbana-Champaign

 Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem. Despite over a decade of research, little progress has been made… (more)

Subjects/Keywords: Distributed Denial of Service (DDoS) Attacks; Internet Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2015). FlowPolice: enforcing congestion accountability to defend against DDoS attacks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed January 24, 2021. http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Web. 24 Jan 2021.

Vancouver:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

24. Davis, James Collins. On the Impact and Defeat of Regular Expression Denial of Service.

Degree: PhD, Computer Science and Applications, 2020, Virginia Tech

 Software commonly performs pattern-matching tasks on strings. For example, when validating input in a Web form, software commonly tests whether an input fits the pattern… (more)

Subjects/Keywords: Regular expressions; denial of service; ReDoS; empirical software engineering; software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, J. C. (2020). On the Impact and Defeat of Regular Expression Denial of Service. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98593

Chicago Manual of Style (16th Edition):

Davis, James Collins. “On the Impact and Defeat of Regular Expression Denial of Service.” 2020. Doctoral Dissertation, Virginia Tech. Accessed January 24, 2021. http://hdl.handle.net/10919/98593.

MLA Handbook (7th Edition):

Davis, James Collins. “On the Impact and Defeat of Regular Expression Denial of Service.” 2020. Web. 24 Jan 2021.

Vancouver:

Davis JC. On the Impact and Defeat of Regular Expression Denial of Service. [Internet] [Doctoral dissertation]. Virginia Tech; 2020. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10919/98593.

Council of Science Editors:

Davis JC. On the Impact and Defeat of Regular Expression Denial of Service. [Doctoral Dissertation]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98593


University of Texas – Austin

25. -7819-4835. Automatic static analysis of software performance.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Performance is a critical component of software quality. Software performance can have drastic repercussions on an application, frustrating its users, breaking the functionality of its… (more)

Subjects/Keywords: Static analysis; Security; Performance; Program analysis; Denial-of-service; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-7819-4835. (2016). Automatic static analysis of software performance. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/40279

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-7819-4835. “Automatic static analysis of software performance.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 24, 2021. http://hdl.handle.net/2152/40279.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-7819-4835. “Automatic static analysis of software performance.” 2016. Web. 24 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-7819-4835. Automatic static analysis of software performance. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2152/40279.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-7819-4835. Automatic static analysis of software performance. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/40279

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Dayton

26. Xia, Yu. Selective Dropping of Rate Limiting Against Denial of Service Attacks.

Degree: Master of Computer Science (M.C.S.), Computer Science, 2016, University of Dayton

 In a Denial of Service (DoS) attack, attackers attempt to prevent legitimate users from accessing services on the Internet. As the Internet was designed to… (more)

Subjects/Keywords: Computer Science; rate limiting; denial of service; DoS; selective dropping; attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xia, Y. (2016). Selective Dropping of Rate Limiting Against Denial of Service Attacks. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316

Chicago Manual of Style (16th Edition):

Xia, Yu. “Selective Dropping of Rate Limiting Against Denial of Service Attacks.” 2016. Masters Thesis, University of Dayton. Accessed January 24, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.

MLA Handbook (7th Edition):

Xia, Yu. “Selective Dropping of Rate Limiting Against Denial of Service Attacks.” 2016. Web. 24 Jan 2021.

Vancouver:

Xia Y. Selective Dropping of Rate Limiting Against Denial of Service Attacks. [Internet] [Masters thesis]. University of Dayton; 2016. [cited 2021 Jan 24]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.

Council of Science Editors:

Xia Y. Selective Dropping of Rate Limiting Against Denial of Service Attacks. [Masters Thesis]. University of Dayton; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316


University of Nairobi

27. Lemayian, Nooseli M. Denial of service in ISPs in Kenya .

Degree: 2008, University of Nairobi

 Disruption from service caused by Denial of Service (DoS) attacks is an increasing phenomenon in the internet today. DoS attacks are a virulent, relatively new… (more)

Subjects/Keywords: Internet Service Provider; Denial of Service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lemayian, N. M. (2008). Denial of service in ISPs in Kenya . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lemayian, Nooseli M. “Denial of service in ISPs in Kenya .” 2008. Thesis, University of Nairobi. Accessed January 24, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lemayian, Nooseli M. “Denial of service in ISPs in Kenya .” 2008. Web. 24 Jan 2021.

Vancouver:

Lemayian NM. Denial of service in ISPs in Kenya . [Internet] [Thesis]. University of Nairobi; 2008. [cited 2021 Jan 24]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lemayian NM. Denial of service in ISPs in Kenya . [Thesis]. University of Nairobi; 2008. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

28. Liščinský, Matúš. Fuzz testování výkonu programu: Fuzz Testing of Program Performance.

Degree: 2019, Brno University of Technology

 Fixing one issue sometimes brings another ten to the program. To detect these issues, especially performance issues, we often have to supply the program with… (more)

Subjects/Keywords: výkonnostné chyby; fuzz testovanie; mutácia vstupu; najhorší prípad; algoritmická zraniteľnosť; denial of service; performance bugs; fuzz testing; workload mutation; worst-case; algorithmic vulnerability; denial of service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liščinský, M. (2019). Fuzz testování výkonu programu: Fuzz Testing of Program Performance. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/180090

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liščinský, Matúš. “Fuzz testování výkonu programu: Fuzz Testing of Program Performance.” 2019. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/180090.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liščinský, Matúš. “Fuzz testování výkonu programu: Fuzz Testing of Program Performance.” 2019. Web. 24 Jan 2021.

Vancouver:

Liščinský M. Fuzz testování výkonu programu: Fuzz Testing of Program Performance. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/180090.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liščinský M. Fuzz testování výkonu programu: Fuzz Testing of Program Performance. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/180090

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

29. Kuppusamy, Lakshmi Devi. Modelling client puzzles and denial-of-service resistant protocols.

Degree: 2012, Queensland University of Technology

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled… (more)

Subjects/Keywords: denial-of-service; client puzzles; message authentication codes; pseudo-random function; hash function; authenticated key exchange; meadows' cost-based framework; random Oracle model; standard model; denial-of-service resistant protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuppusamy, L. D. (2012). Modelling client puzzles and denial-of-service resistant protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61032/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/61032/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Web. 24 Jan 2021.

Vancouver:

Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/61032/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/61032/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Tureček, David. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.

Degree: 2019, Brno University of Technology

 This bachelor thesis deals with the concept of cybercrime. It begins with a description of the historical development of cybercrime and computer technology relating thereto.… (more)

Subjects/Keywords: kybernetická kriminalita; kybernetické hrozby; virus; malware; internet; Deep Web; antivirus; Denial of Service; cybercrime; cyber threats; virus; malware; Internet; Deep Web; antivirus; Denial of Service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tureček, D. (2019). Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tureček, David. “Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.” 2019. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/173804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tureček, David. “Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.” 2019. Web. 24 Jan 2021.

Vancouver:

Tureček D. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/173804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tureček D. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7]

.