MH Rahmati, MR Jalilvand - International Journal of Quality & …, 2024 - emerald.com
Purpose Current models of organizational excellence are appropriate for the private organizations. It is evident that if an appropriate model is not adopted, the process of …
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes …
With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with developing technologies, attacks …
Internet traffic as well as network attacks have been growing rapidly that necessitates efficient network traffic monitoring. Many efforts have been put to address this issue; …
S Arukonda, S Sinha - Advanced Computer Science, 2015 - academia.edu
In this paper we make a comparable study of the various types of Reflector Denial of Service attacks popularly known as DRDoS attacks. We discuss their cause, effects, defense …
As the Internet grows, cybersecurity problems also arise. Different types of malicious activities have been explored by attackers. However, the existent defense mechanisms are …
S Saravanan, G Prakash - Applied Soft Computing and Communication …, 2021 - Springer
The traffic data in Internet is enormous as most of the population in the world uses Internet nowadays. Due to the improvement in the speed of modern communication links in Internet …
A Dauda, S Mclean, A Almehmadi… - Proceedings of the 11th …, 2018 - dl.acm.org
The need for security1 continues to grow in distributed computing. Today's security solutions require greater scalability and convenience in cloud-computing architectures, in addition to …
MSM Deli, SA Ismail, N Kama… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
On the Internet, malware is one of the most serious threats to system security. Major complex issues and problems on some software systems are oftentimes made by malware. Malware …