Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Tribe FloodNet

Known as: TFN 
The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In today’s era, managerial decision making has become a very momentous component due to the leverage of attention on achieving… Expand
Highly Cited
2015
Highly Cited
2015
In this study, a new type of thin film nanocomposite (TFN) reverse osmosis (RO) membranes was prepared by incorporating different… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2012
2012
In this paper, we represent evaluation information by 2‐dimension linguistic labels so as to avoid biased results and achieve… Expand
Highly Cited
2012
Highly Cited
2012
Since the breakthrough discovery made by Cadotte and his co-workers in the 1970s, thin-film composite (TFC) membrane prepared… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2011
Highly Cited
2011
Process performance can be analyzed by using process capability indices (PCIs), which are summary statistics to depict the… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 6
Highly Cited
2009
Highly Cited
2009
Hybrid zeolite-polyamide thin film nanocomposite (TFN) reverse osmosis membranes were synthesized by incorporating Linde type A… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
Fuzzy State Space Model (FSSM) is a new modeling technique, which was developed for solving inverse problems in multivariable… Expand
  • table 3
  • table 1
  • table 2
  • figure 1
  • figure 2
2007
2007
In this paper a new method based on fuzzy theory is developed to solve the project scheduling problem under fuzzy environment… Expand
  • table 2
Highly Cited
2005
Highly Cited
2005
Discrete event computer simulation is one of the most widely used modeling tools for production systems. Object-oriented… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
2000
Highly Cited
2000
In this paper we present an analysis of Shaft, an example of malware used in distributed denial of service (DDoS) attacks. This… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4