Denial-of-service attack

Known as: Phlashing, DoS attack, Reflector 
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1940-2017
01000200019402016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process… (More)
  • figure 1
  • figure 3
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
S ensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. Their… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Attackers can render distributed denial-of-service attacks more difficult to defend against by bouncing their flooding traffic… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this article, we seek to address a simple question: “How prevalent are denial-of-service attacks in the Internet?” Our… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a two-dimensional architecture for defending against denial of service attacks. In one dimension, the architecture… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 8
  • figure 7
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called… (More)
  • figure 2
  • figure 1
  • table 1
  • figure 3
  • figure 4
Is this relevant?