Skip to search formSkip to main contentSkip to account menu

Denial-of-service attack

Known as: Phlashing, Dos attack, Reflector 
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
—IEEE 802.11 specifications set the standard for Physical and Medium Access Control (MAC) layer for implementing wireless Local… 
2014
2014
This article presents a potential tool for solving one of the biggest problems of security of network resources in computer… 
2014
2014
: Availability is one of the three main objectives of computer security, along with confidentiality and integrity. Availability… 
2010
2010
  • Weifang Wang
  • 2010
  • Corpus ID: 14698054
As we know, secure communication is the key of success for any wireless network. Denial of Service (DoS) attacks is severe in all… 
2009
2009
  • Simon Liu
  • 2009
  • Corpus ID: 32012750
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection… 
2007
2007
This paper will examine various denial of service attacks and network defense measures taken against them. A historical look at… 
2002
2002
  • A. Piskozub
  • 2002
  • Corpus ID: 62704097
The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their… 
2002
2002
Authentication of multicast streams has attracted a lot of attention in the last few years. However, two important issues, namely… 
2001
2001
This short paper discusses defenses against Distributed Denial of Service (DDoS) attacks. DoS attacks are of particular interest… 
2001
2001
Denial of service (DoS) attacks come in a variety of types and can target groups of users, individual users, or entire computer…