Search Result "DDOS attacks in routing protocols"


DDoS Attacks, New DDoS Taxonomy, And Mitigation Solutions

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010009

Research Article

Performance Analysis of Cluster-Based DDoS Defense System with Different Reactive Routing Protocols

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 1 Year: 2021 Page: 54-65
Author(s): Deepa Nehra,Kanwalvir Singh Dhindsa,Bharat Bhushan

General Research Article

Performance Analysis of Hybrid Protocol Under Distributed Denial ofService Attack in Remote Healthcare Systems

Journal: Recent Advances in Computer Science and Communications
Volume: 15 Issue: 3 Year: 2022 Page: 432-442
Author(s): Ashu Gautam,Sherin Zafar

Review Article

A Review on Secure Routing Protocols for Wireless Sensor Networks

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 7 Issue: 2 Year: 2017 Page: 79-92
Author(s): Oladayo O. Olakanmi,Adama Pamela,Abbas Ashraf

A Survey on VANETs Security Attacks and Sybil Attack Detection

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 6 Issue: 1 Year: 2016 Page: 45-62
Author(s): Chaitanya Kumar Karn, Chandra Prakash Gupta

IoT-Botnet Detection and Mitigation for Smart Healthcare Systems using Advanced Machine Learning Techniques

Ebook: Blockchain and IoT based Smart Healthcare Systems
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815196290124010014

General Research Article

Big Data Analytics for MANET Based Sustainable Smart Healthcare Solution

Journal: Recent Advances in Computer Science and Communications
Volume: 15 Issue: 4 Year: 2022 Page: 601-610
Author(s): Ashu Gautam,Rashima Mahajan,Sherin Zafar

Internet Protocols: Transition, Security Issues and the World of IoT

Ebook: Recent Developments in Artificial Intelligence and Communication Technologies
Volume: 1 Year: 2022
Author(s):
Doi: 10.2174/9781681089676122010004

Research Article

Black Hole Attack Detection in Healthcare Wireless Sensor Networks Using Independent Component Analysis Machine Learning Technique

Journal: Current Signal Transduction Therapy
Volume: 15 Issue: 1 Year: 2020 Page: 56-64
Author(s): A. John Clement Sunder,A. Shanmugam

Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

Journal: Recent Patents on Computer Science
Volume: 6 Issue: 1 Year: 2013 Page: 73-81
Author(s): Biswajit Panja, Bharat Bhargava, Sourav Pati, Dayton Paul, Leszek T. Lilien, Priyanka Meharia

Previous   Next

Go To   Results 1 - 1 of 25

Apply Filters

Volume Years
Article Type
    Publication Title
      Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy