Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,299 papers from all fields of science
Search
Sign In
Create Free Account
Flooding, Catastrophic
Known as:
Catastrophic Flooding
, Catastrophic Floodings
, Floodings, Catastrophic
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Floods
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features
Jiewen Mao
,
Weijun Deng
,
Fuke Shen
17th IEEE International Conference On Trust…
2018
Corpus ID: 52160220
Distributed Denial of Service (DDoS) attacks are still considered as severe threats to the Internet. Previous works have used…
Expand
Review
2015
Review
2015
An Algorithm for Static Geographical clustering in VANET
Prabhjot Kaur Dhugga
,
Meenakshi Sharma
,
Anshu Sharma
IEEE 3rd International Conference on MOOCs…
2015
Corpus ID: 1550129
Vehicular Ad-hoc Networks (VANETs) which nowadays showed distinct researches around the globe. Advancements in wireless networks…
Expand
2013
2013
Experimental evaluation of Snort against DDoS attacks under different hardware configurations
A. Saboor
,
M. Akhlaq
,
B. Aslam
2nd National Conference on Information Assurance…
2013
Corpus ID: 14301978
Network intrusion detection systems are considered as one of the basic entities widely utilized and studied in the field of…
Expand
2009
2009
The Simulation and Comparison of Routing Attacks on DSR Protocol
Jiwen Cai
,
Ping Yi
,
Ye Tian
,
Yongkai Zhou
,
Ning Liu
International Conference on Wireless…
2009
Corpus ID: 7068571
This paper focuses on mobile ad hoc network's routing vulnerability and compares network performance under several attacks. First…
Expand
2009
2009
VoIP Denial of service attacks classification and implementation
H. Al-Allouni
,
A. Rohiem
,
M. Hashem
,
A. El-moghazy
,
Abdelgawadf Ahmed
National Radio Science Conference
2009
Corpus ID: 26784890
Voice over Internet Protocol (VoIP) is the newest and the fastest growing technology which consists of routing voice…
Expand
2006
2006
Distributed Change-Point Detection of DDoS Attacks over Multiple Network Domains ∗
Yu Chen
,
K. Hwang
,
Wei-Shinn Ku
2006
Corpus ID: 14888901
Distributed denial of services (DDoS) attacks post a major threat to Internet security. This paper proposes a distributed system…
Expand
2006
2006
Can Microsoft’s Service Pack2 (SP2) Security Software Prevent SMURF Attacks?
Sanjeev Kumar
,
Montasir Azad
,
O. Gomez
,
R. Valdez
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 10248804
DDoS flooding attacks are quite popular with hackers and they can cause devastating impact on computer systems. Smurf attack is a…
Expand
2001
2001
A Gateway-based Defense System for Distributed DoS Attacks in High-Speed Networks
D. Xuan
,
R. Bettati
,
Wei Zhao
2001
Corpus ID: 16669635
In this paper, we describe a defense system to contain DDoS ∞ooding attacks in high-speed networks. We aim at protecting TCP…
Expand
1986
1986
Maize response to intermittent submergence, straw mulching and supplemental N-fertilization in subtropical region
B. Sandhu
,
Balwinderjit Singh
,
Baldev Singh
,
K. Khera
Plant and Soil
1986
Corpus ID: 21141022
SummaryA 2-year field study was undertaken on a sandy loam in a tropical monsoon region to determine the growth and yield…
Expand
1978
1978
Should Premarital Syphilis Serologies Continue to be Mandated by Law?
Y. Felman
1978
Corpus ID: 71267647
ONE OF the screening tests that has been used to measure the extent of communicable syphilis in a population is the premarital…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE