نتایج جستجو برای: flooding

تعداد نتایج: 13699  

2012
XUEHUA YANG

Through deeply analyzing on the principle, mode, character of SIP DoS and the flooding attacks faced by SIP network, the prevention model to combine a dynamic threshold adjustment with real-time dynamic prevention for SIP flooding attacks was proposed. This model included logically chi-square traffic judgement model, cumulative statistics model and IP prevention model, among which chi-square tr...

2003
Yoav Sasson David Cavin André Schiper

Although far from optimal, flooding is an indispensable message dissemination technique for network-wide broadcast within mobile ad hoc networks (MANETs). As such, the plain flooding algorithm provokes a high number of unnecessary packet rebroadcasts, causing contention, packet collisions and ultimately wasting precious limited bandwidth. Studies have been undertaken to optimize flooding using ...

Journal: :Indiana Law Review 2015

2010
Jaeik Cho Hojoon Lee Ken Choi Sangyep Nam Jongsub Moon

Most of the network management part, especially a network security needs effective visualization methods for flooding connections. Because many web systems using huge users are suffering from huge normal connections with flooding attacks. Also, most of the connection cases have to be monitored for intrusion detection including any kinds of abnormal connection cases. Therefore, in this paper we ...

Journal: :E3S web of conferences 2022

Different influencing factors in the process of polymer flooding have different degrees influence on development effect, so it is necessary to carry out dynamic prediction before implementing scheme. In this study, reservoir model C Block established and production performance fitted. The fitted used study concentration, injection time, rate multiple timing effect Block. results show that cumul...

Journal: :Int. J. Applied Earth Observation and Geoinformation 2014
David C. Mason Laura Giustarini Javier García-Pintado Hannah L. Cloke

Flooding is a particular hazard in urban areas worldwide due to the increased risks to life and property in these regions. SAR sensors are often used to image flooding because of their all-weather day-night capability, and now possess sufficient resolution to image urban flooding. The flood extents extracted from the images may be used for flood relief management and improved urban flood inunda...

2013
Lisa Brown Virginia Murray

Flooding has been of significant concern since the beginning of human civilization and has led to extensive morbidity and mortality. Floods are the most common natural disaster worldwide and specifically in Europe; hence, a crucial area of research. Between 1997 and 2006, the number of global flood events doubled. European vulnerability to flooding has been highlighted by recent flooding events...

2002
Line Rochefort Suzanne Campeau Jean-Luc Bugnon

Site preparation for restoration of peat-mined bogs in eastern Canada frequently involves the construction of bunds or shallow basins to enhance peat moisture content. As a consequence, Sphagnum reintroduced within restored areas may be subjected to extended periods of flooding, particularly following snow melt or heavy rainfall. This paper examines two aspects of the effect of flooding on grow...

2004
Mahat Khelfallah Belaid Benhamou

In this paper, we are interested in geographic information revision in the framework of a flooding problem. We show how to express and how to revise this problem by using simple linear constraints. We present two revision strategies based on linear constraints resolution: the partial revision and the global revision methods. We apply these approaches on both a real-world flooding problem and ra...

2015
Md. Ariful Hoque Barnali Chakraborty

This paper discusses a statistical algorithm to detect DOS attacks on computer networks. DOS attacks hamper the network by making resources unavailable to genuine users. The algorithm presented here use SNMP data in order to detect incoming flooding attack on a computer or network. The data to be monitored depends on the class of flooding attacks that is intended to be detected. In this paper w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید