Search Result "Computer attacks"
Overview of Attack Surfaces in Blockchain
Ebook: Blockchain Applications in Cybersecurity Solutions
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815080599123010007
Solutions for DDoS Attacks on Cloud Environment
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010006
A Survey on VANETs Security Attacks and Sybil Attack Detection
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 6 Issue: 1 Year: 2016 Page: 45-62
Author(s): Chaitanya Kumar Karn, Chandra Prakash Gupta
Cloud Provider's Response to Multiple Models of Attack Behaviors
Journal: Recent Patents on Engineering
Volume: 13 Issue: 4 Year: 2019 Page: 325-333
Author(s): Xu Liu,Xiaoqiang Di,Jinqing Li,Huamin Yang,Ligang Cong,Jianping Zhao
All-Inclusive Attack Taxonomy and IoT Security Framework
Ebook: Smart Home and Industrial IoT Devices: Critical Perspectives on Cyberthreats, Frameworks and Protocols
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815256710124010010
A Method for Estimating the Uncertainties in Attackerâs Behavior Using Attack Graph Structure
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 6 Issue: 1 Year: 2017 Page: 26-40
Author(s): Letafat Sadat Mohajirani,Hamed Orojloo
Patents in Power Analysis Attacks and their Countermeasures for Cryptographic Devices
Journal: Recent Patents on Electrical Engineering
Volume: 3 Issue: 3 Year: 2010 Page: 177-185
Author(s): Radu Muresan
DDoS Attacks, New DDoS Taxonomy, And Mitigation Solutions
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010009
Cognitive Radio: Primary User Emulation Attacks and Remedies
Journal: Recent Patents on Computer Science
Volume: 5 Issue: 2 Year: 2012 Page: 103-108
Author(s): Sachin Shetty,Meena Thanu,Ravi Ramachandran
Signcryption-Based Security Framework for Low Computing Power Devices
Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 5 Year: 2020 Page: 845-857
Author(s): Anuj Kumar Singh,B.D.K. Patro