Facet browsing currently unavailable
Page 1 of 5231 results
Sort by: relevance publication year
Network Attack Detection and Mitigation PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops |
XSS Vulnerability Detection Using Optimized Attack Vector Repertory PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery |
Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) BOOK CHAPTER published 19 April 2016 in Security of Self-Organizing Networks |
A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Computing, Communication and Security (ICCCS) |
Sybil Attack in VANETs: Detection and Prevention BOOK CHAPTER published 19 April 2016 in Security of Self-Organizing Networks |
Guarding web application with multi - Angled attack detection PROCEEDINGS ARTICLE published February 2015 in 2015 International Conference on Soft-Computing and Networks Security (ICSNS) |
DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Computational Intelligence and Networks |
CINDAM: Customized Information Networks for Deception and Attack Mitigation PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops |
A XSS Vulnerability Detection Approach Based on Simulating Browser Behavior PROCEEDINGS ARTICLE published December 2015 in 2015 2nd International Conference on Information Science and Security (ICISS) |
Multi-step Attack Pattern Detection on Normalized Event Logs PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing |
Attack detection and mitigation using optimal deep maxout network in cloud computing JOURNAL ARTICLE published September 2022 in International Journal of Adaptive Control and Signal Processing |
Physical Layer Security in Cognitive Radio Networks: Detection and Mitigation of Primary User Emulation Attacks PROCEEDINGS ARTICLE published 7 January 2015 in International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015) Jan. 7-8, 2015 Dubai (UAE) |
Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM) |
Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM) |
DDoS Attack Detection Using Flow Entropy and Clustering Technique PROCEEDINGS ARTICLE published December 2015 in 2015 11th International Conference on Computational Intelligence and Security (CIS) |
Preventing Black Hole Attack in AODV using timer-based detection mechanism PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Signal Processing and Communication Engineering Systems |
Cross Layer Anomaly Based Intrusion Detection System PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops |
Continuous monitoring methods as a mechanism for detection and mitigation of growing threats in banking security system PROCEEDINGS ARTICLE published December 2015 in 2015 4th International Conference on Interactive Digital Media (ICIDM) |
A Novel Approach of Detection and Mitigation of DDOS Attack PROCEEDINGS ARTICLE published 20 April 2015 in International Institute of Engineers April 20-21, 2015 Bangkok (Thailand) |
Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS) PROCEEDINGS ARTICLE published September 2015 in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions) |