Adaptive artificial immune networks for mitigating DoS flooding attacks
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
[引用][C] Adaptive artificial immune networks for mitigating DoS flooding attacks
JM Vidal, ALS Orozco… - Swarm and …, 2018 - produccioncientifica.ucm.es
Adaptive Artificial Immune Networks for Mitigating DoS Flooding Attacks
J Maestre Vidal, AL Sandoval Orozco… - 2018 - docta.ucm.es
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks
J Maestre Vidal, A Lucila Sandoval Orozco… - arXiv e …, 2024 - ui.adsabs.harvard.edu
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks
JM Vidal, ALS Orozco, LJG Villalba - arXiv preprint arXiv:2402.07714, 2024 - arxiv.org
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
[PDF][PDF] Swarm and Evolutionary Computation
JM Vidal, ALS Orozco, LJG Villalba - docta.ucm.es
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …