Towards {IoT-DDoS} Prevention Using Edge Computing

K Bhardwaj, JC Miranda, A Gavrilovska - … workshop on hot topics in edge …, 2018 - usenix.org
Application-level DDoS attacks mounted using compromised IoT devices are emerging as a
critical problem. The application-level and seemingly legitimate nature of traffic in such …

A review of DDoS attacks and its countermeasures in cloud computing

SA Varma, KG Reddy - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
In the present scenario, cloud computing has become a marketable technology that allows
consumers to easily access resources through the internet, based on pay per use model …

[图书][B] Controversies in digital ethics

A Davisson, P Booth - 2016 - books.google.com
Controversies in Digital Ethics explores ethical frameworks within digital culture. Through a
combination of theoretical examination and specific case studies, the essays in this volume …

Security QoS profiling against cyber terrorism in airport network systems

FN Ugwoke, KC Okafor… - … on Cyberspace (CYBER …, 2015 - ieeexplore.ieee.org
Attacks on airport information network services in the form of Denial of Service (DoS),
Distributed DoS (DDoS), and hijacking are the most effective schemes mostly explored by …

[PDF][PDF] Mitigating Effect of Uncertain Exogenous Dynamics by Parametric Performance Improvement with Optimal Control Design

BS Solanki, R Kumawat… - Int. J. Eng. Trends Technol., 2022 - researchgate.net
Emerging development in networked control systems has been observed by integrating
sensors, controllers, and actuators. The networked control systems (NCSs) are used in …

Digital vigilantism: examining online justice, ethical challenges, and the role of social media

D Doležal - Hrvatska revija za rehabilitacijska istraživanja, 2024 - hrcak.srce.hr
Sažetak Crime has emerged in various forms and contexts throughout history, and one of
the more specialised forms is so-called vigilantism. In the traditional sense, vigilantism is the …

DIGITALNI VIGILANTIZAM: ANALIZA INTERNETSKE PRAVDE, ETIČKIH IZAZOVA I ULOGE DRUŠTVENIH MEDIJA.

D Doležal - … of Rehabilitation Research/Hrvatska Revija za …, 2024 - search.ebscohost.com
Crime has emerged in various forms and contexts throughout history, and one of the more
specialised forms is so-called vigilantism. In the traditional sense, vigilantism is the …

[PDF][PDF] Vulnerability bandwidth depletion attack on distributed cloud computing network: A qos perspective

KC Okafor, JA Okoye, G Ononiwu - International Journal of …, 2016 - researchgate.net
ABSTRACT A previous work on Airport Information Resource Management System (AIRMS)
established that sophisticated attacks in the form of Denial of Service (DoS), Distributed DoS …

[图书][B] An Empirical Examination of the Computer Security Behaviors of Telecommuters Working with Confidential Data through Leveraging the Factors from Fear …

TD Fofung - 2021 - search.proquest.com
Computer users' security compliance behaviors can be better understood by devising an
experimental study to examine how fear appeals might impact users' security behavior …

Mitigation Model for DDoS Attack in Wireless Sensor Networks

S Gond, A Nath - 2015 - ethesis.nitrkl.ac.in
A Denial-of-Service is an attack in which the attackers send certain messages to the target
systems or target servers with a purpose and intention of shutting down those system or …