These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

97 related articles for article (PubMed ID: 28282962)

  • 1. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network.
    Li J; Hu H; Ke Q; Xiong N
    Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28282962
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
    Latif R; Abbas H; Latif S; Masood A
    J Med Syst; 2016 Jul; 40(7):161. PubMed ID: 27189623
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing.
    Bamasag O; Alsaeedi A; Munshi A; Alghazzawi D; Alshehri S; Jamjoom A
    PeerJ Comput Sci; 2022; 7():e814. PubMed ID: 35721670
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort.
    Chen CL; Lai JL
    Sensors (Basel); 2023 Jul; 23(13):. PubMed ID: 37447987
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SDN-Defend: A Lightweight Online Attack Detection and Mitigation System for DDoS Attacks in SDN.
    Wang J; Wang L
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365984
    [TBL] [Abstract][Full Text] [Related]  

  • 6. SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.
    Patil NV; Krishna CR; Kumar K
    Cluster Comput; 2022; 25(2):1355-1372. PubMed ID: 35068996
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack.
    Zhang Y; Wang Y; Hu Y; Lin Z; Zhai Y; Wang L; Zhao Q; Wen K; Kang L
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236385
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Method of DDoS Attack Detection and Mitigation for the Comprehensive Coordinated Protection of SDN Controllers.
    Wang J; Wang L; Wang R
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628240
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Design and analysis of DDoS mitigating network architecture.
    Swati ; Roy S; Singh J; Mathew J
    Int J Inf Secur; 2023; 22(2):333-345. PubMed ID: 36471814
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An entropy and machine learning based approach for DDoS attacks detection in software defined networks.
    Hassan AI; El Reheem EA; Guirguis SK
    Sci Rep; 2024 Aug; 14(1):18159. PubMed ID: 39103359
    [TBL] [Abstract][Full Text] [Related]  

  • 11. KS-DDoS: Kafka streams-based classification approach for DDoS attacks.
    Patil NV; Krishna CR; Kumar K
    J Supercomput; 2022; 78(6):8946-8976. PubMed ID: 35068686
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks.
    Nazih W; Hifny Y; Elkilani WS; Dhahri H; Abdelkader T
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33080829
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
    Costa Gondim JJ; de Oliveira Albuquerque R; Clayton Alves Nascimento A; García Villalba LJ; Kim TH
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27827931
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis.
    Chen YH; Lai YC; Zhou KZ
    Micromachines (Basel); 2021 Aug; 12(9):. PubMed ID: 34577663
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.
    Saleh MA; Abdul Manaf A
    ScientificWorldJournal; 2015; 2015():238230. PubMed ID: 26065015
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks.
    Shi B; Wei W; Wang Y; Shu W
    Sensors (Basel); 2016 Oct; 16(10):. PubMed ID: 27754405
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Boğaziçi University distributed denial of service dataset.
    Erhan D; Anarım E
    Data Brief; 2020 Oct; 32():106187. PubMed ID: 32904236
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment.
    Riskhan B; Safuan HAJ; Hussain K; Elnour AAH; Abdelmaboud A; Khan F; Kundi M
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514868
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A hybrid machine learning approach for detecting unprecedented DDoS attacks.
    Najafimehr M; Zarifzadeh S; Mostafavi S
    J Supercomput; 2022; 78(6):8106-8136. PubMed ID: 35017789
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.