Highly Influential Citations29
Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage publications (all current information on this profile has been aggregated automatically from publisher and metadata sources).
The paper analyzes a network based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission… Continue Reading
A computer system should provide confidentiality, integrity and assurance against denial of service. However, due to increased connectivity (especially on the Internet), and the vast spectrum of… Continue Reading
Abstract The present study aims at designing a methodology for wasteland development using GIS techniques. An analytical sequence was performed using various inputs to provide answers to the project… Continue Reading
The concept of the global information infrastructure and specifically that of the World Wide Web (WWW) has led to users accessing data of different media including images and video data over a wide… Continue Reading
The concept of the global information infrastructure and speciically that of the World Wide Web (WWW) has led to users accessing data of diierent media including images and video data over a wide… Continue Reading