Collaborative access control in on-line social networks

B Carminati, E Ferrari - 7th international conference on …, 2011 - ieeexplore.ieee.org
Topology-based access control is today a de-facto standard for protecting resources in On-
line Social Networks (OSNs) both within the research community and commercial OSNs …

[PDF][PDF] Network attacks and their detection mechanisms: A review

NS Mangrulkar, ARB Patil, AS Pande - International Journal of Computer …, 2014 - Citeseer
With the development of large open networks, security threats for the network have
increased significantly in the past few years. Different types of attacks possess different types …

Cybersecurity metrics for enhanced protection of healthcare IT systems

Y Ahmed, S Naqvi, M Josephs - 2019 13th International …, 2019 - ieeexplore.ieee.org
Cybersecurity incidents are on the rise in the health-care sector and it is becoming a
growing concern for the senior executives. The attack surface is expanding due to the large …

A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds

M Tehaam, S Ahmad, H Shahid… - 2022 24th …, 2022 - ieeexplore.ieee.org
Cloud provides access to shared pool of resources like storage, networking, and processing.
Distributed denial of service attacks are dangerous for Cloud services because they mainly …

Countering burst header packet flooding attack in optical burst switching network

A Rajab, CT Huang, M Al-Shargabi, J Cobb - Information Security Practice …, 2016 - Springer
Optical burst switching (OBS) network is a promising switching technology for building the
next-generation of Internet backbone infrastructure. It works by assembling UDP packets …

Mathematical modelling of DDoS attack and detection using correlation

K Johnson Singh, T De - Journal of cyber security technology, 2017 - Taylor & Francis
Distributed denial of service attack (DDoS) is one of the top-rated cyber threats currently. It
runs down the victim server resources such as bandwidth and buffer size by obstructing the …

An impact analysis: Real time DDoS attack detection and mitigation using machine learning

BSK Devi, G Preetha, G Selvaram… - … Conference on Recent …, 2014 - ieeexplore.ieee.org
Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers
the normal functionality of critical services in internet community. DDoS cyber weapon is …

[PDF][PDF] A comparative analysis of security methods for DDoS attacks in the cloud computing environment

BSK Devi, T Subbulakshmi - Indian Journal of Science and …, 2016 - researchgate.net
Cloud security is of the major concern in the deployment and protection of cloud deployment
models. In this paper, detailed investigations on the recent DDoS attacks and comparative …

Detection and defense algorithms of different types of DDoS attacks using machine learning

MAM Yusof, FHM Ali, MY Darus - … and Technology: 4th ICCST 2017, Kuala …, 2018 - Springer
Recently, many organizations require security tools to maintain their network or IoT
environment from DDoS attacks. Most security tools today, do not have enough power to …

An algorithm for moderating DoS attack in web based application

DSN Mary, AT Begum - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The denial of service attack is the most powerful damaging attacks used by hackers to harm
a business or organization. This attack is one of most dangerous cyber-attacks. It causes …