نتایج جستجو برای: dos resistance

تعداد نتایج: 501953  

2011
Huyu Qu Qiang Cheng Yi Wang

A wireless network is more vulnerable to denial of service (DoS) attacks than a wired one. In this paper we propose a new DoS defense scheme toward actively resisting DoS attacks. A mobile terminal generates an authorized anonymous ID (AAI) using its true ID, and assigns its true ID with the produced AAI. Using an AAI, a legitimate mobile terminal will be authenticated by the wireless network, ...

2006
Michael Murgu Edson Rodrigues-Filho

Frutos de Sapindus saponaria (Sapindaceae), uma planta amplamente distribuída nos trópicos, foram coletados a cada trinta dias, durante seis meses. Estudos usando cromatografia a líquido com detecção por UV e EM (CLAE/UV/ESI-EM) e fragmentações por EM/EM, mostraram que os principais glicosídeos presentes nesses frutos são saponinas (SAP) derivadas dos triterpenos hederagenina e ácido oleanólico...

2016
R. S. Vetrivel

In today’s networks one major problem, especially for Service Providers, is related to various attacks either active or passive. Denial of Services (DoS) is one of the most difficult to detect and stop. Denial of Service (DoS) and its derivative, Distributed Denial of Service (DDoS) are some of the most common attacks. There are many types of DoS: Buffer Overflow, SYN attacks, teardrop attack, ...

1999
P. D. Bogdanoff B. Fultz S. Rosenkranz

The phonon density of states of elemental Au, Cu, and Cu3Au with L12 chemical order were measured by inelastic neutron scattering and used to calculate the vibrational entropy of formation of the ordered compound from the elemental metals. A vibrational entropy of formation of (0.0660.03) kB /atom at 300 K was obtained, with the vibrational entropy of the ordered alloy being larger than that of...

2011
Juan Deng Richard R. Brooks James Martin

The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resultin...

2001

Me tá te se é uma re a ção atra en te para a con ver são de óle os e gor du ras em pro du tos quí mi cos úte is. Assim, a me tá te se de és te res de áci dos gra xos in sa tu ra dos (cons ti tu in tes bá si cos de óle os e gor du ras) é uma rota con ve ni en te para a sín te se de diés te res in sa tu ra dos, que po dem ser usa dos como in ter me diá ri os na pro du ção de po lí me ros e na quí...

2016
Sala Lyra L. Paulos S. Azevedo P. Mourato H. Loreto A. I. Lopes

Introdução e objetivo: A Doença Inl amatória Intestinal (DII) em 25-30% dos casos manifesta-se em idade pediátrica, reconhecendose um aumento da incidência nos últimos anos, particularmente de Doença de Cronh (DC). Pretendeu-se caracterizar o peri l clínico dos casos de DII em seguimento numa Unidade de Gastrenterologia Pediátrica, num período de 11 anos. Material e métodos: Estudo retrospectiv...

2002
John Haggerty Qi Shi Madjid Merabti

The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However, as the case study and analysis in this paper make apparent, the perimeter model, which relies on firewalls and Intrusion Detection Systems, is unable to provide an effective defence against DoS attacks. Therefore, the...

1995
Pedro Marques de Carvalho

A octividade do empresa encontro-se focoda no fornecimento de soluVHes integradas no 6rea dos T.I. que perrnitarn aos nossos c!ientes tornar as sous neg6cios rnais cornpetitivos e eficientes. O esquema apresentado de seguida i!ustra o posicionamenta Que a ernpresa pretende ter no mercaclo:-Skills Recurses ExperiSacia RespoasabiHdade Qualidade ^-Ajudar cs clientes significa criar nos suas organi...

2012
CHUNYAN SHUAI XIN OUYANG

Detection and traceback of distributed denial of service (DDoS/DoS) attacks have become a challenge for network security. In this paper, we propose a lightweight cooperative detection framework (CCBFF) based on counting bloom filter to detect and trace DDoS/DoS attack online. The CCBFF contains 2 counting bloom filters CBF1 and CBF2. The CBF1 distinguishes different network connection topology ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید