نتایج جستجو برای: HTTP Flood

تعداد نتایج: 155164  

Journal: :journal of advances in computer engineering and technology 2015
bita amirshahi ali ahangari

abstract—today, botnets have become a serious threat to enterprise networks. by creation of network of bots, they launch several attacks, distributed denial of service attacks (ddos) on networks is a sample of such attacks. such attacks with the occupation of system resources, have proven to be an effective method of denying network services. botnets that launch http packet flood attacks agains...

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com...

2002
André Zúquete

Current Linux kernels include a facility called TCP SYN cookies, conceived to face SYN flooding attacks. However, the current implementation of SYN cookies does not support the negotiation of TCP options, although some of them are relevant for throughput performance, such as large windows or selective acknowledgment. In this paper we present an improvement of the SYN cookie protocol, using all ...

Journal: :Remote Sensing 2015
Beatriz Revilla Romero Feyera A. Hirpa Jutta Thielen-del Pozo Peter Salamon G. Robert Brakenridge Florian Pappenberger Tom De Groeve

Early flood warning and real-time monitoring systems play a key role in flood risk reduction and disaster response decisions. Global-scale flood forecasting and satellite-based flood detection systems are currently operating, however their reliability for decision making applications needs to be assessed. In this study, we performed comparative evaluations of several operational global flood fo...

Journal: :افق دانش 0
محمد بکائیان m. bokaeian microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران حامد طهماسبی h. tahmasebi microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران علیرضا محمدزاده a.r. mohammadzadeh microbiology department, medicine school, gonabad university of medical sciences, gonabad, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی گناباد، گناباد، ایران جواد ادبی j. adabi microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران ناهید سپهری راد n. sepehri rad infectious diseases & tropical medicine research center, zahedan university of medical sciences,مرکر تحقیقات بیماری عفونی- گرمسیری، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران

aims: it is very important to detect the coagulase-negative staphylococci, which produce the hospital infections. being one of the most expensive and time-consuming stages before the polymerase chain reaction (pcr), dna extraction is one of the primary stages of pcr. then, it should be noticed that the elimination of the stage might save time and costs. the aim of this study was to compare two ...

2017
Shaun A. Maskrey Nick J. Mount Colin R. Thorne Ian Dryden

Advancing stakeholder participation beyond consultation offers a range of benefits for local flood risk management, particularly as responsibilities are increasingly devolved to local levels. This paper details the design and implementation of a participatory approach to identify intervention options for managing local flood risk. Within this approach, Bayesian networks were used to generate a ...

2015
Wendy Zhao Jeffrey Czajkowski

In March 2014, Congress passed legislation to halt discounted flood insurance premiums from increasing to full-risk levels. The rate hike was authorized two years earlier by the Biggert-Waters Act to address the National Flood Insurance Program’s structurally induced $24 billion debt. The recent developments highlight the tension between risk-based premium and affordability of flood insurance f...

2015
Florian Pappenberger Hannah L. Cloke Dennis J. Parker Fredrik Wetterhall David S. Richardson Jutta Thielen

Effective disaster risk management relies on science-based solutions to close the gap between prevention and preparedness measures. The consultation on the United Nations post-2015 framework for disaster risk reduction highlights the need for cross-border early warning systems to strengthen the preparedness phases of disaster risk management, in order to save lives and property and reduce the o...

Journal: :JNW 2011
Bo Hang Ruimin Hu Wei Shi

With the development of network, the issues of network security are rapidly becoming a serious problem, and the Denial of Service (DoS) attack has already become the greatest threat to the network. SYN Flood attack is one of the most common distributed denial of service attack way (DDoS). This paper presents an improved SYN Cookie method, designing a novel attack detector processing and a enhan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید