Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,682,477 papers from all fields of science
Search
Sign In
Create Free Account
Denial-of-service attack
Known as:
Phlashing
, Dos attack
, Reflector
Expand
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
4chan
Anti-worm
Application delivery network
Application security
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Denial of Service Attack in Wireless LAN
Tauseef Jamal
,
Pedro Amaral
,
Asifullah Khan
,
Aneela Zameer
,
Kiramat Ullah
,
S. A. Butt
2018
Corpus ID: 199019478
—IEEE 802.11 specifications set the standard for Physical and Medium Access Control (MAC) layer for implementing wireless Local…
Expand
2010
2010
Denial of service attacks in cognitive radio networks
Weifang Wang
The 2nd Conference on Environmental Science and…
2010
Corpus ID: 14698054
As we know, secure communication is the key of success for any wireless network. Denial of Service (DoS) attacks is severe in all…
Expand
2009
2009
Detecting Denial of Service Attacks in Tor
N. Danner
,
D. Krizanc
,
M. Liberatore
Financial Cryptography
2009
Corpus ID: 14525342
Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov…
Expand
2009
2009
Surviving Distributed Denial-of-Service Attacks
Simon Liu
IT Professional
2009
Corpus ID: 32012750
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection…
Expand
2007
2007
Common Denial of Service Attacks
D. Slee
2007
Corpus ID: 166707394
This paper will examine various denial of service attacks and network defense measures taken against them. A historical look at…
Expand
2006
2006
Identification of Repeated Denial of Service Attacks
Alefiya Hussain
,
J. Heidemann
,
C. Papadopoulos
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 880588
Denial of Service attacks have become a weapon for extortion and vandalism causing damages in the millions of dollars to…
Expand
2002
2002
Denial of service and distributed denial of service attacks
A. Piskozub
Modern Problems of Radio Engineering…
2002
Corpus ID: 62704097
The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their…
Expand
2002
2002
Authenticated multicast immune to denial-of-service attack
Shouhuai Xu
,
R. Sandhu
ACM Symposium on Applied Computing
2002
Corpus ID: 2956764
Authentication of multicast streams has attracted a lot of attention in the last few years. However, two important issues, namely…
Expand
2001
2001
Defenses Against Distributed Denial of Service Attacks
G. Kessler
2001
Corpus ID: 166255505
This short paper discusses defenses against Distributed Denial of Service (DDoS) attacks. DoS attacks are of particular interest…
Expand
2001
2001
Assessing and quantifying denial of service attacks
D. Gregg
,
W. Blackert
,
D. Heinbuch
,
D. Furnanage
MILCOM Proceedings Communications for Network…
2001
Corpus ID: 62023866
Denial of service (DoS) attacks come in a variety of types and can target groups of users, individual users, or entire computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE