Tribe FloodNet

Known as: TFN 
The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In real-world manufacturing environments, it is common to face a job-shop scheduling problem (JSP) with uncertainty. Among… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2013
2013
The aim of the paper is to present a new simple to use and efficient MCEQLS (Multiple Criteria Evaluation of the Quality of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2011
2011
Process performance can be analyzed by using process capability indices (PCIs), which are summary statistics to depict the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 6
Is this relevant?
2006
2006
Claim provisions are crucial for the financial stability of insurance companies. This is why actuarial literature has proposed… (More)
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Is this relevant?
2005
2005
Discrete event computer simulation is one of the most widely used modeling tools for production systems. Object-oriented… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Samples of 53 materials that are used or potentially can be used or in the fabrication of microelectromechanical systems and… (More)
  • table I
  • table II
  • table III
  • table IV
  • table V
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a ranking method for fuzzy numbers. In this method a preference function is de ned by which fuzzy numbers are measured… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper we present an analysis of Shaft, an example of malware used in distributed denial of service (DDoS) attacks. This… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Direct implementation of extended arithmetic operators on fuzzy numbers is computationally complex. Implementation of the… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
1987
Highly Cited
1987
When a complex system is to be realized as a combination of interacting components, development of those components should… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?