Amanote Research

Amanote Research

    RegisterSign In

An Investigation of Security Techniques for Concealed Ddos Exposure Attacks

ICTACT Journal on Communication Technology
doi 10.21917/ijct.2018.0246
Full Text
Open PDF
Abstract

Available in full text

Date

March 1, 2018

Authors
K PraghashM MasthanR Ravi
Publisher

ICT Academy


Related search

An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

ITM Web of Conferences
2017English

FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks

Computer Journal
Computer Science
2014English

Unified Defense Against DDoS Attacks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Network Domain Entrypoint/Path Determination for DDoS Attacks

2008English

An Overview of DDOS Attacks Detection and Prevention in the Cloud

International Journal of Applied Information Systems
2016English

Conceptual Analysis of Different Clustering Techniques for Static Security Investigation

International Journal of Intelligent Systems and Applications
ControlSignal ProcessingHuman-Computer InteractionOptimizationComputer NetworksSimulationCommunicationsComputer Science ApplicationsModelingArtificial Intelligence
2019English

A Collaborative Architecture Agianst DDOS Attacks for Cloud Computing Systems.

English

A Hybrid Model for Detecting DDoS Attacks in Wide Area Networks

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

A Policy-Based Architecture for Protecting 802.11 Wlans Against Ddos Attacks

2004English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy