[PDF][PDF] IoDDoS-the internet of distributed denial of sevice attacks

R Hallman, J Bryan, G Palavicini, J Divita… - … conference on internet …, 2017 - scitepress.org
The Internet of Things (IoT), a platform and phenomenon allowing everything to process
information and communicate data, is populated by 'things' which are introducing a multitude …

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …

[HTML][HTML] A fair multi-attribute data transaction mechanism supporting cross-chain

K Fan, C Zhou, N Lu, W Shi, V Chang - Internet of Things, 2024 - Elsevier
Reliable storage and high-speed data networks enable individuals to access high-quality
Internet of Things (IoT) data for scientific research through global transactions. Blockchain …

NATO'NUN YENİ OPERASYON ALANI: SİBER UZAY

D Polat - Güvenlik Bilimleri Dergisi, 2020 - dergipark.org.tr
NATO (Kuzey Atlantik Antlaşması Örgütü), üye ülkelerin ortak savunma yeteneklerini
geliştirmek, toprak bütünlüklerini, siyasi bağımsızlıklarını ve güvenliklerini korumak …

Game theoretic strategies for an unmanned aerial vehicle network host under DDoS attack

A Mairaj, S Majumder, AY Javaid - … International Conference on …, 2019 - ieeexplore.ieee.org
Game theory involves the mathematical modeling of the strategic interaction between
rational entities. One such example is the interaction between a hacker and the defense …

[PDF][PDF] Big Data and Cloud Computing Concerns and its Impact on Computer Graphics and Visualization

MA Khader, MHDY Abbar… - Applied Science …, 2022 - naturalspublishing.com
The world is undergoing massive scientific and technical discoveries that have a significant
impact on humans. One of these discoveries is Big Data where massive volumes of data …

Visualisierung der IT-Sicherheitslage

T Klaiber, M Kühner, M Maier, S Ziegler - Industrie 4.0: Wie cyber …, 2017 - Springer
Industrie 4.0 birgt neben Vorteilen auch eine Reihe von Gefahren. Industrie 4.0 ist
angreifbar, Cyber-Attacken bedrohen nicht nur vernetzte Anlagen. Besonders kleinere und …

A Literature Review of the Seriousness of Flooding-based DoS Attack

HM Albadi, MA Khder, SW Fujo… - … on Innovation and …, 2022 - ieeexplore.ieee.org
The denial of service (DoS) attack has evolved into one of the most serious security threats
on the Internet, aimed at preventing a service from being available. To launch a distributed …

[图书][B] Strategies for Cybercrime Prevention in Information Technology Businesses

SG Tucker - 2022 - search.proquest.com
Cybercrime continues to be a devastating phenomenon, impacting individuals and
businesses across the globe. Information technology (IT) businesses need solutions to …

[HTML][HTML] ПОДХОД К ЗАЩИТЕ ИНТЕРФЕЙСОВ УПРАВЛЕНИЯ КИБЕРФИЗИЧЕСКОЙ СИСТЕМОЙ ОТ УГРОЗ НАРУШЕНИЯ ДОСТУПНОСТИ

АЮ Исхаков, ЕФ Жарко - Информационные и математические …, 2023 - cyberleninka.ru
Необходимость развития существующих подходов и научно-технических решений в
области обеспечения информационной безопасности вызвана стремительным …