Advanced search options
You searched for subject:(Denial of service)
.
Showing records 1 – 30 of
197 total matches.
◁ [1] [2] [3] [4] [5] [6] [7] ▶
Search Limiters
Dates
Universities
Department
▼ Search Limiters
University of North Texas
1. Jensen, David. Ddos Defense Against Botnets in the Mobile Cloud.
Degree: 2014, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc500027/
Subjects/Keywords: Denial of service; Botnet; mobile
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jensen, D. (2014). Ddos Defense Against Botnets in the Mobile Cloud. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc500027/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Thesis, University of North Texas. Accessed January 24, 2021. https://digital.library.unt.edu/ark:/67531/metadc500027/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Web. 24 Jan 2021.
Vancouver:
Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Internet] [Thesis]. University of North Texas; 2014. [cited 2021 Jan 24]. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Luleå University of Technology
2. Johansson, Marcus. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.
Degree: 2015, Luleå University of Technology
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987
Subjects/Keywords: Technology; DDOS; DOS; Distributed Denial of Service; Denial of Service; Teknik
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Johansson, M. (2015). Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Thesis, Luleå University of Technology. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Web. 24 Jan 2021.
Vancouver:
Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Internet] [Thesis]. Luleå University of Technology; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Thesis]. Luleå University of Technology; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Anna University
3. Moorthy M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.
Degree: Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks, 2015, Anna University
URL: http://shodhganga.inflibnet.ac.in/handle/10603/34200
Subjects/Keywords: Denial of Service; local area networks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
M, M. (2015). Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34200
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/34200.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Web. 24 Jan 2021.
Vancouver:
M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
East Carolina University
4. Fu, Tian. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.
Degree: 2012, East Carolina University
URL: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333
Subjects/Keywords: Wireless LANs; Denial of service attacks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Fu, T. (2012). MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333
Chicago Manual of Style (16th Edition):
Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Masters Thesis, East Carolina University. Accessed January 24, 2021. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.
MLA Handbook (7th Edition):
Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Web. 24 Jan 2021.
Vancouver:
Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2021 Jan 24]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.
Council of Science Editors:
Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333
Rutgers University
5. Gawande, Arpit Ramesh, 1986-. DDoS detection and mitigation using machine learning.
Degree: MS, Computer Science, 2018, Rutgers University
URL: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/
Subjects/Keywords: Machine learning; Denial of service attacks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Gawande, Arpit Ramesh, 1. (2018). DDoS detection and mitigation using machine learning. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57074/
Chicago Manual of Style (16th Edition):
Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Masters Thesis, Rutgers University. Accessed January 24, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.
MLA Handbook (7th Edition):
Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Web. 24 Jan 2021.
Vancouver:
Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2021 Jan 24]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.
Council of Science Editors:
Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/
Queensland University of Technology
6. Bhatia, Sajal. Detecting distributed Denial-of-Service attacks and Flash Events.
Degree: 2013, Queensland University of Technology
URL: https://eprints.qut.edu.au/62031/
Subjects/Keywords: Denial-of-Service; Distributed Denial-of-Service; Flash Events; Synthetic Traffic Generation; Modelling
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Bhatia, S. (2013). Detecting distributed Denial-of-Service attacks and Flash Events. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/62031/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/62031/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Web. 24 Jan 2021.
Vancouver:
Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/62031/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/62031/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Queensland University of Technology
7. Tritilanunt, Suratose. Protocol engineering for protection against denial-of-service attacks.
Degree: 2009, Queensland University of Technology
URL: https://eprints.qut.edu.au/26277/
Subjects/Keywords: denial of service attacks; denial of service resistance; key establishment proto- cols; Host Identity Protocol (HIP); Meadows' cost-based framework; Coloured Petri Nets; CPN Tools; denial of service modelling
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tritilanunt, S. (2009). Protocol engineering for protection against denial-of-service attacks. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/26277/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tritilanunt, Suratose. “Protocol engineering for protection against denial-of-service attacks.” 2009. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/26277/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tritilanunt, Suratose. “Protocol engineering for protection against denial-of-service attacks.” 2009. Web. 24 Jan 2021.
Vancouver:
Tritilanunt S. Protocol engineering for protection against denial-of-service attacks. [Internet] [Thesis]. Queensland University of Technology; 2009. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/26277/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tritilanunt S. Protocol engineering for protection against denial-of-service attacks. [Thesis]. Queensland University of Technology; 2009. Available from: https://eprints.qut.edu.au/26277/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Vanderbilt University
8. Emfinger, William Alexander. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.
Degree: PhD, Electrical Engineering, 2015, Vanderbilt University
URL: http://hdl.handle.net/1803/14549
Subjects/Keywords: prediction; performance; systems; physical; network; real-time; embedded; analysis; cyber; spacecraft; denial of service; distributed denial of service; calculus
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Emfinger, W. A. (2015). Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14549
Chicago Manual of Style (16th Edition):
Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Doctoral Dissertation, Vanderbilt University. Accessed January 24, 2021. http://hdl.handle.net/1803/14549.
MLA Handbook (7th Edition):
Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Web. 24 Jan 2021.
Vancouver:
Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Internet] [Doctoral dissertation]. Vanderbilt University; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1803/14549.
Council of Science Editors:
Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Doctoral Dissertation]. Vanderbilt University; 2015. Available from: http://hdl.handle.net/1803/14549
9. Andersen, Jonas Skog. Denial-of-service attack : A realistic implementation of a DoS attack.
Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690
Subjects/Keywords: DOS; DDOS; Attack; Denial of Service; Distributed denial of service attack; HTTP POST; HTTP POST attack; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Andersen, J. S. (2015). Denial-of-service attack : A realistic implementation of a DoS attack. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Thesis, Linköping UniversityLinköping University. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Web. 24 Jan 2021.
Vancouver:
Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Addis Ababa University
10. Wassihun, Beyene. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .
Degree: 2020, Addis Ababa University
URL: http://etd.aau.edu.et/handle/123456789/21113
Subjects/Keywords: Adaptive Booster; ANN; Distributed denial of service attack; Denial of service attack; Hping3; J48; Naive Bayes; SYN flood attack; WEKA; Wireshark
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Wassihun, B. (2020). Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/handle/123456789/21113
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wassihun, Beyene. “Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .” 2020. Thesis, Addis Ababa University. Accessed January 24, 2021. http://etd.aau.edu.et/handle/123456789/21113.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wassihun, Beyene. “Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom .” 2020. Web. 24 Jan 2021.
Vancouver:
Wassihun B. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . [Internet] [Thesis]. Addis Ababa University; 2020. [cited 2021 Jan 24]. Available from: http://etd.aau.edu.et/handle/123456789/21113.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wassihun B. Performance Evaluation of Machine Learning Algorithms for Detection of SYN Flood Attack: The case of ethio telecom . [Thesis]. Addis Ababa University; 2020. Available from: http://etd.aau.edu.et/handle/123456789/21113
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
11. Andersson, Emil. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.
Degree: 2012, , Faculty of Technology and Society (TS)
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596
Subjects/Keywords: DDoS; DoS; Distributed Denial of Service; Denial of Service; HTTP-GET-DoS; TCP-SYN-Flood; Engineering and Technology; Teknik och teknologier
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Andersson, E. (2012). DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. (Thesis). , Faculty of Technology and Society (TS). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Andersson, Emil. “DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.” 2012. Thesis, , Faculty of Technology and Society (TS). Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Andersson, Emil. “DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon.” 2012. Web. 24 Jan 2021.
Vancouver:
Andersson E. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. [Internet] [Thesis]. , Faculty of Technology and Society (TS); 2012. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Andersson E. DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon. [Thesis]. , Faculty of Technology and Society (TS); 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Columbia University
12. Yang, Yudong. Transparently Improving Quality of Service of Modern Applications.
Degree: 2019, Columbia University
URL: https://doi.org/10.7916/d8-fvfm-yg67
Subjects/Keywords: Computer science; Quality of service (Computer networks); Cloud computing; Wireless Internet; Denial of service attacks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Yang, Y. (2019). Transparently Improving Quality of Service of Modern Applications. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/d8-fvfm-yg67
Chicago Manual of Style (16th Edition):
Yang, Yudong. “Transparently Improving Quality of Service of Modern Applications.” 2019. Doctoral Dissertation, Columbia University. Accessed January 24, 2021. https://doi.org/10.7916/d8-fvfm-yg67.
MLA Handbook (7th Edition):
Yang, Yudong. “Transparently Improving Quality of Service of Modern Applications.” 2019. Web. 24 Jan 2021.
Vancouver:
Yang Y. Transparently Improving Quality of Service of Modern Applications. [Internet] [Doctoral dissertation]. Columbia University; 2019. [cited 2021 Jan 24]. Available from: https://doi.org/10.7916/d8-fvfm-yg67.
Council of Science Editors:
Yang Y. Transparently Improving Quality of Service of Modern Applications. [Doctoral Dissertation]. Columbia University; 2019. Available from: https://doi.org/10.7916/d8-fvfm-yg67
Rochester Institute of Technology
13. Winemiller, Nathan. NAT denial of service: An Analysis of translation table behavior on multiple platforms.
Degree: MS, Computer Science (GCCIS), 2011, Rochester Institute of Technology
URL: https://scholarworks.rit.edu/theses/315
Subjects/Keywords: Denial of service; NAT; Network address translation; Translation table
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Winemiller, N. (2011). NAT denial of service: An Analysis of translation table behavior on multiple platforms. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/315
Chicago Manual of Style (16th Edition):
Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed January 24, 2021. https://scholarworks.rit.edu/theses/315.
MLA Handbook (7th Edition):
Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Web. 24 Jan 2021.
Vancouver:
Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2021 Jan 24]. Available from: https://scholarworks.rit.edu/theses/315.
Council of Science Editors:
Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/315
Anna University
14. Jayashree, P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.
Degree: 2013, Anna University
URL: http://shodhganga.inflibnet.ac.in/handle/10603/13375
Subjects/Keywords: Adaptive Multi-tier; distributed denial of service; active networks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jayashree, P. (2013). An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13375
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/13375.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Web. 24 Jan 2021.
Vancouver:
Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Internet] [Thesis]. Anna University; 2013. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Thesis]. Anna University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Anna University
15. Sandhya M K. Secure data aggregation and forwarding in wireless sensor networks;.
Degree: Secure data aggregation and forwarding in wireless sensor networks, 2015, Anna University
URL: http://shodhganga.inflibnet.ac.in/handle/10603/49404
Subjects/Keywords: Data aggregation; Denial of Service; Wireless sensor networks
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
K, S. M. (2015). Secure data aggregation and forwarding in wireless sensor networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/49404
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
K, Sandhya M. “Secure data aggregation and forwarding in wireless sensor networks;.” 2015. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/49404.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
K, Sandhya M. “Secure data aggregation and forwarding in wireless sensor networks;.” 2015. Web. 24 Jan 2021.
Vancouver:
K SM. Secure data aggregation and forwarding in wireless sensor networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/49404.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
K SM. Secure data aggregation and forwarding in wireless sensor networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/49404
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
16. Anurekha, R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.
Degree: Information and Communication Engineering, 2014, Anna University
URL: http://shodhganga.inflibnet.ac.in/handle/10603/22192
Subjects/Keywords: Distributed Denial of Service; Information and communication engineering
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Anurekha, R. (2014). Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22192
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Thesis, Anna University. Accessed January 24, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/22192.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Web. 24 Jan 2021.
Vancouver:
Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Internet] [Thesis]. Anna University; 2014. [cited 2021 Jan 24]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Rhodes University
17. Davis, Michael Reginald. Categorising Network Telescope data using big data enrichment techniques.
Degree: Faculty of Science, Computer Science, 2019, Rhodes University
URL: http://hdl.handle.net/10962/92941
Subjects/Keywords: Denial of service attacks; Big data; Computer networks – Security measures
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Davis, M. R. (2019). Categorising Network Telescope data using big data enrichment techniques. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/92941
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Thesis, Rhodes University. Accessed January 24, 2021. http://hdl.handle.net/10962/92941.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Web. 24 Jan 2021.
Vancouver:
Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Internet] [Thesis]. Rhodes University; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10962/92941.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Thesis]. Rhodes University; 2019. Available from: http://hdl.handle.net/10962/92941
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Colorado State University
18. Kambhampati, Vamsi K. Protecting critical services from DDoS attacks.
Degree: PhD, Computer Science, 2012, Colorado State University
URL: http://hdl.handle.net/10217/67463
Subjects/Keywords: distributed denial of service; proxies; location hiding; hidden paths
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Kambhampati, V. K. (2012). Protecting critical services from DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/67463
Chicago Manual of Style (16th Edition):
Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2012. Doctoral Dissertation, Colorado State University. Accessed January 24, 2021. http://hdl.handle.net/10217/67463.
MLA Handbook (7th Edition):
Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2012. Web. 24 Jan 2021.
Vancouver:
Kambhampati VK. Protecting critical services from DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2012. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10217/67463.
Council of Science Editors:
Kambhampati VK. Protecting critical services from DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/67463
University of Otago
19. Chrobok, Natascha. Receiver Driven Email Delivery .
Degree: 2010, University of Otago
URL: http://hdl.handle.net/10523/397
Subjects/Keywords: security; spam prevention; email; distributed denial of service
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Chrobok, N. (2010). Receiver Driven Email Delivery . (Masters Thesis). University of Otago. Retrieved from http://hdl.handle.net/10523/397
Chicago Manual of Style (16th Edition):
Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Masters Thesis, University of Otago. Accessed January 24, 2021. http://hdl.handle.net/10523/397.
MLA Handbook (7th Edition):
Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Web. 24 Jan 2021.
Vancouver:
Chrobok N. Receiver Driven Email Delivery . [Internet] [Masters thesis]. University of Otago; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10523/397.
Council of Science Editors:
Chrobok N. Receiver Driven Email Delivery . [Masters Thesis]. University of Otago; 2010. Available from: http://hdl.handle.net/10523/397
Deakin University
20. Alajeely, Majeed. Defense and traceback mechanisms in opportunistic wireless networks.
Degree: School of Information Technology, 2015, Deakin University
URL: http://hdl.handle.net/10536/DRO/DU:30085502
Subjects/Keywords: Opportunistic networks; Anabolism defence; Denial of service(DOS)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Alajeely, M. (2015). Defense and traceback mechanisms in opportunistic wireless networks. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30085502
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Alajeely, Majeed. “Defense and traceback mechanisms in opportunistic wireless networks.” 2015. Thesis, Deakin University. Accessed January 24, 2021. http://hdl.handle.net/10536/DRO/DU:30085502.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Alajeely, Majeed. “Defense and traceback mechanisms in opportunistic wireless networks.” 2015. Web. 24 Jan 2021.
Vancouver:
Alajeely M. Defense and traceback mechanisms in opportunistic wireless networks. [Internet] [Thesis]. Deakin University; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10536/DRO/DU:30085502.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Alajeely M. Defense and traceback mechanisms in opportunistic wireless networks. [Thesis]. Deakin University; 2015. Available from: http://hdl.handle.net/10536/DRO/DU:30085502
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Deakin University
21. Ahmad, Asma'a. Establishing trust relationships and secure channels in opportunistic networks.
Degree: School of Information Technology, 2017, Deakin University
URL: http://hdl.handle.net/10536/DRO/DU:30103704
Subjects/Keywords: Opportunistic Networks (OppNets); denial of service (DoS) attack; packet dropping
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ahmad, A. (2017). Establishing trust relationships and secure channels in opportunistic networks. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30103704
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ahmad, Asma'a. “Establishing trust relationships and secure channels in opportunistic networks.” 2017. Thesis, Deakin University. Accessed January 24, 2021. http://hdl.handle.net/10536/DRO/DU:30103704.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ahmad, Asma'a. “Establishing trust relationships and secure channels in opportunistic networks.” 2017. Web. 24 Jan 2021.
Vancouver:
Ahmad A. Establishing trust relationships and secure channels in opportunistic networks. [Internet] [Thesis]. Deakin University; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10536/DRO/DU:30103704.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ahmad A. Establishing trust relationships and secure channels in opportunistic networks. [Thesis]. Deakin University; 2017. Available from: http://hdl.handle.net/10536/DRO/DU:30103704
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Notre Dame
22. David A Cieslak. A Clustering Defense Against Distributed Denial of Service Attacks</h1>.
Degree: Computer Science and Engineering, 2006, University of Notre Dame
URL: https://curate.nd.edu/show/g732d793z75
Subjects/Keywords: Distributed Denial of Service; Clustering
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Cieslak, D. A. (2006). A Clustering Defense Against Distributed Denial of Service Attacks</h1>. (Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/g732d793z75
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Thesis, University of Notre Dame. Accessed January 24, 2021. https://curate.nd.edu/show/g732d793z75.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Web. 24 Jan 2021.
Vancouver:
Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Internet] [Thesis]. University of Notre Dame; 2006. [cited 2021 Jan 24]. Available from: https://curate.nd.edu/show/g732d793z75.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Thesis]. University of Notre Dame; 2006. Available from: https://curate.nd.edu/show/g732d793z75
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Illinois – Urbana-Champaign
23. Liu, Zhuotao. FlowPolice: enforcing congestion accountability to defend against DDoS attacks.
Degree: MS, Electrical & Computer Engr, 2015, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/78589
Subjects/Keywords: Distributed Denial of Service (DDoS) Attacks; Internet Security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Liu, Z. (2015). FlowPolice: enforcing congestion accountability to defend against DDoS attacks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed January 24, 2021. http://hdl.handle.net/2142/78589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Web. 24 Jan 2021.
Vancouver:
Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2142/78589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Virginia Tech
24. Davis, James Collins. On the Impact and Defeat of Regular Expression Denial of Service.
Degree: PhD, Computer Science and Applications, 2020, Virginia Tech
URL: http://hdl.handle.net/10919/98593
Subjects/Keywords: Regular expressions; denial of service; ReDoS; empirical software engineering; software security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Davis, J. C. (2020). On the Impact and Defeat of Regular Expression Denial of Service. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98593
Chicago Manual of Style (16th Edition):
Davis, James Collins. “On the Impact and Defeat of Regular Expression Denial of Service.” 2020. Doctoral Dissertation, Virginia Tech. Accessed January 24, 2021. http://hdl.handle.net/10919/98593.
MLA Handbook (7th Edition):
Davis, James Collins. “On the Impact and Defeat of Regular Expression Denial of Service.” 2020. Web. 24 Jan 2021.
Vancouver:
Davis JC. On the Impact and Defeat of Regular Expression Denial of Service. [Internet] [Doctoral dissertation]. Virginia Tech; 2020. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10919/98593.
Council of Science Editors:
Davis JC. On the Impact and Defeat of Regular Expression Denial of Service. [Doctoral Dissertation]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98593
University of Texas – Austin
25. -7819-4835. Automatic static analysis of software performance.
Degree: PhD, Computer science, 2016, University of Texas – Austin
URL: http://hdl.handle.net/2152/40279
Subjects/Keywords: Static analysis; Security; Performance; Program analysis; Denial-of-service; Privacy
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
-7819-4835. (2016). Automatic static analysis of software performance. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/40279
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Chicago Manual of Style (16th Edition):
-7819-4835. “Automatic static analysis of software performance.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 24, 2021. http://hdl.handle.net/2152/40279.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
MLA Handbook (7th Edition):
-7819-4835. “Automatic static analysis of software performance.” 2016. Web. 24 Jan 2021.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Vancouver:
-7819-4835. Automatic static analysis of software performance. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2152/40279.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Council of Science Editors:
-7819-4835. Automatic static analysis of software performance. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/40279
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
University of Dayton
26. Xia, Yu. Selective Dropping of Rate Limiting Against Denial of Service Attacks.
Degree: Master of Computer Science (M.C.S.), Computer Science, 2016, University of Dayton
URL: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316
Subjects/Keywords: Computer Science; rate limiting; denial of service; DoS; selective dropping; attack
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Xia, Y. (2016). Selective Dropping of Rate Limiting Against Denial of Service Attacks. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316
Chicago Manual of Style (16th Edition):
Xia, Yu. “Selective Dropping of Rate Limiting Against Denial of Service Attacks.” 2016. Masters Thesis, University of Dayton. Accessed January 24, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.
MLA Handbook (7th Edition):
Xia, Yu. “Selective Dropping of Rate Limiting Against Denial of Service Attacks.” 2016. Web. 24 Jan 2021.
Vancouver:
Xia Y. Selective Dropping of Rate Limiting Against Denial of Service Attacks. [Internet] [Masters thesis]. University of Dayton; 2016. [cited 2021 Jan 24]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.
Council of Science Editors:
Xia Y. Selective Dropping of Rate Limiting Against Denial of Service Attacks. [Masters Thesis]. University of Dayton; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316
University of Nairobi
27. Lemayian, Nooseli M. Denial of service in ISPs in Kenya .
Degree: 2008, University of Nairobi
URL: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682
Subjects/Keywords: Internet Service Provider; Denial of Service
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lemayian, N. M. (2008). Denial of service in ISPs in Kenya . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lemayian, Nooseli M. “Denial of service in ISPs in Kenya .” 2008. Thesis, University of Nairobi. Accessed January 24, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lemayian, Nooseli M. “Denial of service in ISPs in Kenya .” 2008. Web. 24 Jan 2021.
Vancouver:
Lemayian NM. Denial of service in ISPs in Kenya . [Internet] [Thesis]. University of Nairobi; 2008. [cited 2021 Jan 24]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lemayian NM. Denial of service in ISPs in Kenya . [Thesis]. University of Nairobi; 2008. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22682
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brno University of Technology
28. Liščinský, Matúš. Fuzz testování výkonu programu: Fuzz Testing of Program Performance.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/180090
Subjects/Keywords: výkonnostné chyby; fuzz testovanie; mutácia vstupu; najhorší prípad; algoritmická zraniteľnosť; denial of service; performance bugs; fuzz testing; workload mutation; worst-case; algorithmic vulnerability; denial of service
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Liščinský, M. (2019). Fuzz testování výkonu programu: Fuzz Testing of Program Performance. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/180090
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Liščinský, Matúš. “Fuzz testování výkonu programu: Fuzz Testing of Program Performance.” 2019. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/180090.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Liščinský, Matúš. “Fuzz testování výkonu programu: Fuzz Testing of Program Performance.” 2019. Web. 24 Jan 2021.
Vancouver:
Liščinský M. Fuzz testování výkonu programu: Fuzz Testing of Program Performance. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/180090.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Liščinský M. Fuzz testování výkonu programu: Fuzz Testing of Program Performance. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/180090
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Queensland University of Technology
29. Kuppusamy, Lakshmi Devi. Modelling client puzzles and denial-of-service resistant protocols.
Degree: 2012, Queensland University of Technology
URL: https://eprints.qut.edu.au/61032/
Subjects/Keywords: denial-of-service; client puzzles; message authentication codes; pseudo-random function; hash function; authenticated key exchange; meadows' cost-based framework; random Oracle model; standard model; denial-of-service resistant protocol
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Kuppusamy, L. D. (2012). Modelling client puzzles and denial-of-service resistant protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61032/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Thesis, Queensland University of Technology. Accessed January 24, 2021. https://eprints.qut.edu.au/61032/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Web. 24 Jan 2021.
Vancouver:
Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2021 Jan 24]. Available from: https://eprints.qut.edu.au/61032/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/61032/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brno University of Technology
30. Tureček, David. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/173804
Subjects/Keywords: kybernetická kriminalita; kybernetické hrozby; virus; malware; internet; Deep Web; antivirus; Denial of Service; cybercrime; cyber threats; virus; malware; Internet; Deep Web; antivirus; Denial of Service
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tureček, D. (2019). Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173804
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tureček, David. “Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.” 2019. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/173804.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tureček, David. “Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention.” 2019. Web. 24 Jan 2021.
Vancouver:
Tureček D. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/173804.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tureček D. Kyberkriminalita: koncepce, odhalování a prevence: Cybercrime: Concept, Detection and Prevention. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173804
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation