Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(distributed denial of service). Showing records 1 – 30 of 251656 total matches.

[1] [2] [3] [4] [5] … [8389]

Search Limiters

Last 2 Years | English Only

Department

Degrees

Levels

Languages

Country

▼ Search Limiters


Luleå University of Technology

1. Johansson, Marcus. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.

Degree: 2015, Luleå University of Technology

Distributed Denial of Service (DDoS) is today a commonly seen computer network attack with the purpose of disrupting various services. This is often achieved… (more)

Subjects/Keywords: Technology; DDOS; DOS; Distributed Denial of Service; Denial of Service; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johansson, M. (2015). Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Thesis, Luleå University of Technology. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johansson, Marcus. “Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines.” 2015. Web. 05 Apr 2020.

Vancouver:

Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Internet] [Thesis]. Luleå University of Technology; 2015. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johansson M. Counteract the Outflanking of DDoS Countermeasures : A Framework for Generating DDoS Defense Guidelines. [Thesis]. Luleå University of Technology; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-43987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

2. Bhatia, Sajal. Detecting distributed Denial-of-Service attacks and Flash Events.

Degree: 2013, Queensland University of Technology

 This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines… (more)

Subjects/Keywords: Denial-of-Service; Distributed Denial-of-Service; Flash Events; Synthetic Traffic Generation; Modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhatia, S. (2013). Detecting distributed Denial-of-Service attacks and Flash Events. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/62031/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Thesis, Queensland University of Technology. Accessed April 05, 2020. https://eprints.qut.edu.au/62031/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bhatia, Sajal. “Detecting distributed Denial-of-Service attacks and Flash Events.” 2013. Web. 05 Apr 2020.

Vancouver:

Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2020 Apr 05]. Available from: https://eprints.qut.edu.au/62031/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bhatia S. Detecting distributed Denial-of-Service attacks and Flash Events. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/62031/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

3. Jayashree, P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.

Degree: 2013, Anna University

The use of e-technologies enables integration of information from various sources and users of Internet increases multifold that leads to severe security concern. The objective… (more)

Subjects/Keywords: Adaptive Multi-tier; distributed denial of service; active networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayashree, P. (2013). An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/13375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jayashree, P. “An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;.” 2013. Web. 05 Apr 2020.

Vancouver:

Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Internet] [Thesis]. Anna University; 2013. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jayashree P. An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks;. [Thesis]. Anna University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Anurekha, R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.

Degree: Information and Communication Engineering, 2014, Anna University

A Distributed Denial of Service DDoS attack is an explicit attempt newlineby an attacker to overload the server s or network s with useless traffic… (more)

Subjects/Keywords: Distributed Denial of Service; Information and communication engineering

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anurekha, R. (2014). Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/22192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anurekha, R. “Dynamic ddos defense with an adaptive spin lock rate control mechanism; -.” 2014. Web. 05 Apr 2020.

Vancouver:

Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Internet] [Thesis]. Anna University; 2014. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anurekha R. Dynamic ddos defense with an adaptive spin lock rate control mechanism; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Notre Dame

5. David A Cieslak. A Clustering Defense Against Distributed Denial of Service Attacks</h1>.

Degree: MSin Computer Science and Engineering, Computer Science and Engineering, 2006, University of Notre Dame

Distributed Denial of Service (DDoS) attacks can quickly bring normally effective web services to a screeching halt. While there has been a significant amount… (more)

Subjects/Keywords: Distributed Denial of Service; Clustering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cieslak, D. A. (2006). A Clustering Defense Against Distributed Denial of Service Attacks</h1>. (Masters Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/g732d793z75

Chicago Manual of Style (16th Edition):

Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Masters Thesis, University of Notre Dame. Accessed April 05, 2020. https://curate.nd.edu/show/g732d793z75.

MLA Handbook (7th Edition):

Cieslak, David A. “A Clustering Defense Against Distributed Denial of Service Attacks</h1>.” 2006. Web. 05 Apr 2020.

Vancouver:

Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Internet] [Masters thesis]. University of Notre Dame; 2006. [cited 2020 Apr 05]. Available from: https://curate.nd.edu/show/g732d793z75.

Council of Science Editors:

Cieslak DA. A Clustering Defense Against Distributed Denial of Service Attacks</h1>. [Masters Thesis]. University of Notre Dame; 2006. Available from: https://curate.nd.edu/show/g732d793z75


University of Otago

6. Chrobok, Natascha. Receiver Driven Email Delivery .

Degree: 2010, University of Otago

 Spam has become a serious problem to email users all over the world. Most of the daily email messages we are receiving consists of unwanted… (more)

Subjects/Keywords: security; spam prevention; email; distributed denial of service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chrobok, N. (2010). Receiver Driven Email Delivery . (Masters Thesis). University of Otago. Retrieved from http://hdl.handle.net/10523/397

Chicago Manual of Style (16th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Masters Thesis, University of Otago. Accessed April 05, 2020. http://hdl.handle.net/10523/397.

MLA Handbook (7th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Web. 05 Apr 2020.

Vancouver:

Chrobok N. Receiver Driven Email Delivery . [Internet] [Masters thesis]. University of Otago; 2010. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10523/397.

Council of Science Editors:

Chrobok N. Receiver Driven Email Delivery . [Masters Thesis]. University of Otago; 2010. Available from: http://hdl.handle.net/10523/397


University of Illinois – Urbana-Champaign

7. Liu, Zhuotao. FlowPolice: enforcing congestion accountability to defend against DDoS attacks.

Degree: MS, Electrical & Computer Engr, 2015, University of Illinois – Urbana-Champaign

 Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem. Despite over a decade of research, little progress has been made… (more)

Subjects/Keywords: Distributed Denial of Service (DDoS) Attacks; Internet Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2015). FlowPolice: enforcing congestion accountability to defend against DDoS attacks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed April 05, 2020. http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Web. 05 Apr 2020.

Vancouver:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vanderbilt University

8. Emfinger, William Alexander. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.

Degree: PhD, Electrical Engineering, 2015, Vanderbilt University

 Cyber-Physical Systems (CPS) are becoming increasingly distributed in nature. These distributed systems interact closely with the physical world and require the use of communications channels… (more)

Subjects/Keywords: prediction; performance; systems; physical; network; real-time; embedded; analysis; cyber; spacecraft; denial of service; distributed denial of service; calculus

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Emfinger, W. A. (2015). Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://etd.library.vanderbilt.edu/available/etd-11162015-090359/ ;

Chicago Manual of Style (16th Edition):

Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Doctoral Dissertation, Vanderbilt University. Accessed April 05, 2020. http://etd.library.vanderbilt.edu/available/etd-11162015-090359/ ;.

MLA Handbook (7th Edition):

Emfinger, William Alexander. “Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications.” 2015. Web. 05 Apr 2020.

Vancouver:

Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Internet] [Doctoral dissertation]. Vanderbilt University; 2015. [cited 2020 Apr 05]. Available from: http://etd.library.vanderbilt.edu/available/etd-11162015-090359/ ;.

Council of Science Editors:

Emfinger WA. Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications. [Doctoral Dissertation]. Vanderbilt University; 2015. Available from: http://etd.library.vanderbilt.edu/available/etd-11162015-090359/ ;

9. Andersen, Jonas Skog. Denial-of-service attack : A realistic implementation of a DoS attack.

Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University

  This report describes some of the most well known denial of service attacks (DoS-attacks). This will be done in the first part of the… (more)

Subjects/Keywords: DOS; DDOS; Attack; Denial of Service; Distributed denial of service attack; HTTP POST; HTTP POST attack; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersen, J. S. (2015). Denial-of-service attack : A realistic implementation of a DoS attack. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Thesis, Linköping UniversityLinköping University. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Web. 05 Apr 2020.

Vancouver:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

10. Mekhitarian, Araxi. A simulation study of an application layer DDoS detection mechanism.

Degree: Information and Communication Technology (ICT), 2016, KTH

Over the last couple of years the rise of application layer Distributed Denial of Service (DDoS) attacks has significantly increased. Because of this, many… (more)

Subjects/Keywords: Distributed Denial of Service attacks; DDoS; application layer; detection; defense; Distributed Denial of Service attacks; DDoS; application layer; detection; defense; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mekhitarian, A. (2016). A simulation study of an application layer DDoS detection mechanism. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mekhitarian, Araxi. “A simulation study of an application layer DDoS detection mechanism.” 2016. Thesis, KTH. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mekhitarian, Araxi. “A simulation study of an application layer DDoS detection mechanism.” 2016. Web. 05 Apr 2020.

Vancouver:

Mekhitarian A. A simulation study of an application layer DDoS detection mechanism. [Internet] [Thesis]. KTH; 2016. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mekhitarian A. A simulation study of an application layer DDoS detection mechanism. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

11. Rajiv Kannan A. Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;.

Degree: 2013, Anna University

Distributed Denial of Service (DDoS) attack involves compromising hundreds of machines all over the internet and is implemented by typically exhausting the bandwidth into hundreds… (more)

Subjects/Keywords: IP Traceback; distributed denial of service; Direction Ratio Algorithm; Direction Ratio Sampling Algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

A, R. K. (2013). Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13439

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

A, Rajiv Kannan. “Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;.” 2013. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/13439.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

A, Rajiv Kannan. “Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;.” 2013. Web. 05 Apr 2020.

Vancouver:

A RK. Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;. [Internet] [Thesis]. Anna University; 2013. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13439.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

A RK. Multi dimensional multi directional geographical IP traceback mechanism for defense against distributed denial of service attacks;. [Thesis]. Anna University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13439

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

12. Subbulakshmi T. Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification.

Degree: Information and Communication, 2012, Anna University

The dynamic challenges faced by the information systems are increasing rapidly. The threats and attacks are framed and launched with new techniques targeting at the… (more)

Subjects/Keywords: Machine Learning Algorithms; Real Time Intrusion; Distributed Denial of Service; Fuzzy Inference Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

T, S. (2012). Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

T, Subbulakshmi. “Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification.” 2012. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/13807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

T, Subbulakshmi. “Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification.” 2012. Web. 05 Apr 2020.

Vancouver:

T S. Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification. [Internet] [Thesis]. Anna University; 2012. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

T S. Application of Machine Learning Algorithms for Real Time Intrusion Detection and Classification. [Thesis]. Anna University; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Benson edwin raj S. Distributed denial of service DDOS Mitigation architecture for web Servers;.

Degree: Distributed denial of service DDOS Mitigation architecture for web Servers, 2015, Anna University

Online services are on a rapid rise in today s Internet world Web newlineServers which host these online services are the prime targets for the… (more)

Subjects/Keywords: Application Layer or Network Layer; Distributed Denial of Service; Internet world Web

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

S, B. e. r. (2015). Distributed denial of service DDOS Mitigation architecture for web Servers;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/33692

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

S, Benson edwin raj. “Distributed denial of service DDOS Mitigation architecture for web Servers;.” 2015. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/33692.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

S, Benson edwin raj. “Distributed denial of service DDOS Mitigation architecture for web Servers;.” 2015. Web. 05 Apr 2020.

Vancouver:

S Ber. Distributed denial of service DDOS Mitigation architecture for web Servers;. [Internet] [Thesis]. Anna University; 2015. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/33692.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

S Ber. Distributed denial of service DDOS Mitigation architecture for web Servers;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/33692

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Stefanidis, Kyriakos. Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο.

Degree: 2013, University of Patras; Πανεπιστήμιο Πατρών

In this thesis we deal with the issue of Distributed Denial of Service attacks on the Internet. We analyze the current defense methodologies and the… (more)

Subjects/Keywords: Κατανεμημένες επιθέσεις άρνησης υπηρεσιών; Ασφάλεια δικτύων; Distributed denial of service attacks; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stefanidis, K. (2013). Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο. (Thesis). University of Patras; Πανεπιστήμιο Πατρών. Retrieved from http://hdl.handle.net/10442/hedi/31563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stefanidis, Kyriakos. “Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο.” 2013. Thesis, University of Patras; Πανεπιστήμιο Πατρών. Accessed April 05, 2020. http://hdl.handle.net/10442/hedi/31563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stefanidis, Kyriakos. “Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο.” 2013. Web. 05 Apr 2020.

Vancouver:

Stefanidis K. Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο. [Internet] [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2013. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10442/hedi/31563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stefanidis K. Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο. [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2013. Available from: http://hdl.handle.net/10442/hedi/31563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Hazeyama, Hiroaki. Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Distributed Denial of Service attack (DDoS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hazeyama, H. (n.d.). Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2854

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hazeyama, Hiroaki. “Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed April 05, 2020. http://hdl.handle.net/10061/2854.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hazeyama, Hiroaki. “Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ.” Web. 05 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Hazeyama H. Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10061/2854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Hazeyama H. Studies on interconnection architecture for traceback systems in practical network operations : 実ネットワークオペレーションにおける追跡システムのための相互接続機構に関する研究; ジツネットワークオペレーション ニ オケル ツイセキ システム ノ タメノ ソウゴ セツゾク キコウ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

16. Στεφανίδης, Κυριάκος. Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο.

Degree: 2013, University of Patras

Η παρούσα διατριβή πραγματεύεται το θέμα των κατανεμημένων επιθέσεων άρνησης υπηρεσιών στο Διαδίκτυο. Αναλύει τα υπάρχοντα συστήματα αντιμετώπισης και τα εργαλεία που χρησιμοποιούνται για την… (more)

Subjects/Keywords: Κατανεμημένες επιθέσεις άρνησης υπηρεσιών; Ασφάλεια δικτύων; 005.8; Distributed Denial of Service Attacks (DDoS); Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Στεφανίδης, . (2013). Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο. (Doctoral Dissertation). University of Patras. Retrieved from http://hdl.handle.net/10889/6840

Chicago Manual of Style (16th Edition):

Στεφανίδης, Κυριάκος. “Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο.” 2013. Doctoral Dissertation, University of Patras. Accessed April 05, 2020. http://hdl.handle.net/10889/6840.

MLA Handbook (7th Edition):

Στεφανίδης, Κυριάκος. “Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο.” 2013. Web. 05 Apr 2020.

Vancouver:

Στεφανίδης . Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο. [Internet] [Doctoral dissertation]. University of Patras; 2013. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10889/6840.

Council of Science Editors:

Στεφανίδης . Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο. [Doctoral Dissertation]. University of Patras; 2013. Available from: http://hdl.handle.net/10889/6840

17. Nilsson, Sebastian. The Current State of DDoS Defense.

Degree: 2014, , Department of Software Engineering

  A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending… (more)

Subjects/Keywords: Information Security; Distributed denial of service attacks; Botnet; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nilsson, S. (2014). The Current State of DDoS Defense. (Thesis). , Department of Software Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nilsson, Sebastian. “The Current State of DDoS Defense.” 2014. Thesis, , Department of Software Engineering. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nilsson, Sebastian. “The Current State of DDoS Defense.” 2014. Web. 05 Apr 2020.

Vancouver:

Nilsson S. The Current State of DDoS Defense. [Internet] [Thesis]. , Department of Software Engineering; 2014. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nilsson S. The Current State of DDoS Defense. [Thesis]. , Department of Software Engineering; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

18. Muthusrinivasan, Muthuprasanna. A composable approach to design of newer techniques for large-scale denial-of-service attack attribution.

Degree: 2011, Iowa State University

 Since its early days, the Internet has witnessed not only a phenomenal growth, but also a large number of security attacks, and in recent years,… (more)

Subjects/Keywords: computer networks; denial-of-service attacks; distributed systems; internet security; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muthusrinivasan, M. (2011). A composable approach to design of newer techniques for large-scale denial-of-service attack attribution. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/12012

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muthusrinivasan, Muthuprasanna. “A composable approach to design of newer techniques for large-scale denial-of-service attack attribution.” 2011. Thesis, Iowa State University. Accessed April 05, 2020. https://lib.dr.iastate.edu/etd/12012.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muthusrinivasan, Muthuprasanna. “A composable approach to design of newer techniques for large-scale denial-of-service attack attribution.” 2011. Web. 05 Apr 2020.

Vancouver:

Muthusrinivasan M. A composable approach to design of newer techniques for large-scale denial-of-service attack attribution. [Internet] [Thesis]. Iowa State University; 2011. [cited 2020 Apr 05]. Available from: https://lib.dr.iastate.edu/etd/12012.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muthusrinivasan M. A composable approach to design of newer techniques for large-scale denial-of-service attack attribution. [Thesis]. Iowa State University; 2011. Available from: https://lib.dr.iastate.edu/etd/12012

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

19. Jensen, David. Ddos Defense Against Botnets in the Mobile Cloud.

Degree: 2014, University of North Texas

 Mobile phone advancements and ubiquitous internet connectivity are resulting in ever expanding possibilities in the application of smart phones. Users of mobile phones are now… (more)

Subjects/Keywords: Denial of service; Botnet; mobile

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jensen, D. (2014). Ddos Defense Against Botnets in the Mobile Cloud. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc500027/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Thesis, University of North Texas. Accessed April 05, 2020. https://digital.library.unt.edu/ark:/67531/metadc500027/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jensen, David. “Ddos Defense Against Botnets in the Mobile Cloud.” 2014. Web. 05 Apr 2020.

Vancouver:

Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Internet] [Thesis]. University of North Texas; 2014. [cited 2020 Apr 05]. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jensen D. Ddos Defense Against Botnets in the Mobile Cloud. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc500027/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

20. Ahmed, Haroon. Security challenges within Software Defined Networks.

Degree: Information and Communication Technology (ICT), 2014, KTH

  A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide… (more)

Subjects/Keywords: Software Defined Networks (SDN); network security; denial of service; distributed denial of service; multi-tenancy; mjukvarudefinierat nätverk; nätverkssäkerhet; överbelastningsattack; distribuerad överbelastningsattack; multitenans; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmed, H. (2014). Security challenges within Software Defined Networks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177394

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ahmed, Haroon. “Security challenges within Software Defined Networks.” 2014. Thesis, KTH. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177394.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ahmed, Haroon. “Security challenges within Software Defined Networks.” 2014. Web. 05 Apr 2020.

Vancouver:

Ahmed H. Security challenges within Software Defined Networks. [Internet] [Thesis]. KTH; 2014. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177394.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ahmed H. Security challenges within Software Defined Networks. [Thesis]. KTH; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177394

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

21. McNevin, Timothy John. Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles.

Degree: MS, Electrical and Computer Engineering, 2005, Virginia Tech

 Over the past few years, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks have become more of a threat than ever. These attacks are aimed at… (more)

Subjects/Keywords: Client puzzles; Denial-of-Service countermeasures; Distributed Denial-of-Service Attacks; Denial-of-Service Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McNevin, T. J. (2005). Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31941

Chicago Manual of Style (16th Edition):

McNevin, Timothy John. “Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles.” 2005. Masters Thesis, Virginia Tech. Accessed April 05, 2020. http://hdl.handle.net/10919/31941.

MLA Handbook (7th Edition):

McNevin, Timothy John. “Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles.” 2005. Web. 05 Apr 2020.

Vancouver:

McNevin TJ. Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles. [Internet] [Masters thesis]. Virginia Tech; 2005. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10919/31941.

Council of Science Editors:

McNevin TJ. Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles. [Masters Thesis]. Virginia Tech; 2005. Available from: http://hdl.handle.net/10919/31941


University of Alabama

22. Zunnurhain, Kazi. FAPA: flooding attack protection architecture in a cloud system.

Degree: 2014, University of Alabama

 The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical,… (more)

Subjects/Keywords: Electronic Thesis or Dissertation;  – thesis; Computer science; Cloud; Compromised; Distributed Denial of Service; Private Cloud; Sibling; Virtual Machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zunnurhain, K. (2014). FAPA: flooding attack protection architecture in a cloud system. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/116189

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zunnurhain, Kazi. “FAPA: flooding attack protection architecture in a cloud system.” 2014. Thesis, University of Alabama. Accessed April 05, 2020. http://purl.lib.ua.edu/116189.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zunnurhain, Kazi. “FAPA: flooding attack protection architecture in a cloud system.” 2014. Web. 05 Apr 2020.

Vancouver:

Zunnurhain K. FAPA: flooding attack protection architecture in a cloud system. [Internet] [Thesis]. University of Alabama; 2014. [cited 2020 Apr 05]. Available from: http://purl.lib.ua.edu/116189.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zunnurhain K. FAPA: flooding attack protection architecture in a cloud system. [Thesis]. University of Alabama; 2014. Available from: http://purl.lib.ua.edu/116189

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Brasília

23. Daniel Rosa Canêdo. Um ambiente experimental para análise de ataques de negação de serviço.

Degree: 2006, Universidade de Brasília

Realizou-se um estudo sobre o ataque de negação de serviço e negação de serviço distribuído, abordando definições a respeito destes ataques, e os procedimentos utilizados… (more)

Subjects/Keywords: ENGENHARIA ELETRICA; ciência da computação; segurança da informação (ciência de computaçaõ); negação de serviço (internet); DDoS (Distributed Denial of Service); internet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Canêdo, D. R. (2006). Um ambiente experimental para análise de ataques de negação de serviço. (Thesis). Universidade de Brasília. Retrieved from http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Canêdo, Daniel Rosa. “Um ambiente experimental para análise de ataques de negação de serviço.” 2006. Thesis, Universidade de Brasília. Accessed April 05, 2020. http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Canêdo, Daniel Rosa. “Um ambiente experimental para análise de ataques de negação de serviço.” 2006. Web. 05 Apr 2020.

Vancouver:

Canêdo DR. Um ambiente experimental para análise de ataques de negação de serviço. [Internet] [Thesis]. Universidade de Brasília; 2006. [cited 2020 Apr 05]. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Canêdo DR. Um ambiente experimental para análise de ataques de negação de serviço. [Thesis]. Universidade de Brasília; 2006. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Cheng, Wei-Cheng. Intrusion Detection on Distributed Attacks.

Degree: Master, Information Management, 2003, NSYSU

 The number of significant security incidents tends to increase day by day in recent years. The distributed denial of service attacks and worm attacks extensively… (more)

Subjects/Keywords: distributed denial of service attack; worm; intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, W. (2003). Intrusion Detection on Distributed Attacks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-165244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Wei-Cheng. “Intrusion Detection on Distributed Attacks.” 2003. Thesis, NSYSU. Accessed April 05, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-165244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Wei-Cheng. “Intrusion Detection on Distributed Attacks.” 2003. Web. 05 Apr 2020.

Vancouver:

Cheng W. Intrusion Detection on Distributed Attacks. [Internet] [Thesis]. NSYSU; 2003. [cited 2020 Apr 05]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-165244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng W. Intrusion Detection on Distributed Attacks. [Thesis]. NSYSU; 2003. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-165244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

25. Kambhampati, Vamsi K. Protecting critical services from DDoS attacks.

Degree: PhD, Computer Science, 2007, Colorado State University

 Critical services such as emergency response, industrial control systems, government and banking systems are increasing coming under threat from Distributed Denial of Service (DDoS) attacks.… (more)

Subjects/Keywords: distributed denial of service; proxies; location hiding; hidden paths

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kambhampati, V. K. (2007). Protecting critical services from DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/67463

Chicago Manual of Style (16th Edition):

Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2007. Doctoral Dissertation, Colorado State University. Accessed April 05, 2020. http://hdl.handle.net/10217/67463.

MLA Handbook (7th Edition):

Kambhampati, Vamsi K. “Protecting critical services from DDoS attacks.” 2007. Web. 05 Apr 2020.

Vancouver:

Kambhampati VK. Protecting critical services from DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10217/67463.

Council of Science Editors:

Kambhampati VK. Protecting critical services from DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/67463

26. Stevanovic, Dusan. Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior.

Degree: PhD, Computer Science, 2016, York University

 The existing state-of-the-art in the field of application layer Distributed Denial of Service (DDoS) protection is generally designed, and thus effective, only for static web… (more)

Subjects/Keywords: Communication; Distributed denial of service; Network security; Machine learning; Data mining; Statistical analysis; Web crawler; Bots; Botnets; Application layer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stevanovic, D. (2016). Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior. (Doctoral Dissertation). York University. Retrieved from http://hdl.handle.net/10315/32673

Chicago Manual of Style (16th Edition):

Stevanovic, Dusan. “Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior.” 2016. Doctoral Dissertation, York University. Accessed April 05, 2020. http://hdl.handle.net/10315/32673.

MLA Handbook (7th Edition):

Stevanovic, Dusan. “Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior.” 2016. Web. 05 Apr 2020.

Vancouver:

Stevanovic D. Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior. [Internet] [Doctoral dissertation]. York University; 2016. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10315/32673.

Council of Science Editors:

Stevanovic D. Denial of Service in Web-Domains: Building Defenses Against Next-Generation Attack Behavior. [Doctoral Dissertation]. York University; 2016. Available from: http://hdl.handle.net/10315/32673


University of Illinois – Urbana-Champaign

27. Kone, Roseline. Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks.

Degree: PhD, 0127, 2014, University of Illinois – Urbana-Champaign

 This thesis presents three procedures to detect Distributed Denial of Service (DDoS) attacks. DDoS attacks are known as one of the most expensive and destructive… (more)

Subjects/Keywords: Poisson Cluster Process; Compound Pareto Distribution; Binary Hypothesis Testing; Sequential Detection; Distributed Denial of Service (DDoS) Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kone, R. (2014). Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/49735

Chicago Manual of Style (16th Edition):

Kone, Roseline. “Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks.” 2014. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed April 05, 2020. http://hdl.handle.net/2142/49735.

MLA Handbook (7th Edition):

Kone, Roseline. “Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks.” 2014. Web. 05 Apr 2020.

Vancouver:

Kone R. Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2014. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/2142/49735.

Council of Science Editors:

Kone R. Monitoring unknown source IP addresses and packet sizes to detect DDoS attacks. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2014. Available from: http://hdl.handle.net/2142/49735


Anna University

28. Moorthy M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.

Degree: Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks, 2015, Anna University

The need for developing a hybrid intrusion detection system has newlinebecome an essential part in implementing the security for a network Today s newlinenetwork suffers… (more)

Subjects/Keywords: Denial of Service; local area networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

M, M. (2015). Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Thesis, Anna University. Accessed April 05, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/34200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

M, Moorthy. “Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;.” 2015. Web. 05 Apr 2020.

Vancouver:

M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2020 Apr 05]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

M M. Hybrid fuzzy based intrusion detection System to prevent Denial of service DOS attacks using authentication Technique in wireless local area Networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Carolina University

29. Fu, Tian. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.

Degree: 2012, East Carolina University

 Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of… (more)

Subjects/Keywords: Wireless LANs; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, T. (2012). MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333

Chicago Manual of Style (16th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Masters Thesis, East Carolina University. Accessed April 05, 2020. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.

MLA Handbook (7th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Web. 05 Apr 2020.

Vancouver:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2020 Apr 05]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333.

Council of Science Editors:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14333


Rutgers University

30. Gawande, Arpit Ramesh, 1986-. DDoS detection and mitigation using machine learning.

Degree: MS, Computer Science, 2018, Rutgers University

Distributed Denial of Service (DDoS) attacks are very common nowadays. It is evident that the current industry solutions, such as completely relying on the In-… (more)

Subjects/Keywords: Machine learning; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gawande, Arpit Ramesh, 1. (2018). DDoS detection and mitigation using machine learning. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57074/

Chicago Manual of Style (16th Edition):

Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Masters Thesis, Rutgers University. Accessed April 05, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.

MLA Handbook (7th Edition):

Gawande, Arpit Ramesh, 1986-. “DDoS detection and mitigation using machine learning.” 2018. Web. 05 Apr 2020.

Vancouver:

Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2020 Apr 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/.

Council of Science Editors:

Gawande, Arpit Ramesh 1. DDoS detection and mitigation using machine learning. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57074/

[1] [2] [3] [4] [5] … [8389]

.