Our world today relies heavily on informatics and the internet, as computers and communications networks have increased day by day. In fact, the increase is not limited to portable devices such as smartphones and tablets, but also to home appliances such as: televisions, refrigerators, and controllers. It has made them more vulnerable to electronic attacks. The denial of service (DoS) attack is one of the most common attacks that affect the provision of services and commercial sites over the internet. As a result, we decided in this paper to create a smart model that depends on the swarm algorithms to detect the attack of denial of service in internet networks, because the intelligence algorithms have flexibility, elegance and adaptation to...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
Due to the exponential growth of E-Business and computing capabilities over the web for a pay-for-us...
Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets ...
Copyright © 2015 P. Amudha et al. This is an open access article distributed under the Creative Comm...
Power system cybersecurity has recently become important due to cyber-attacks. Due to advanced compu...
Intrusion detection has become a main part of network security due to the huge number of attacks whi...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
Now a day’s advancement in technology increases the use of automation, mobility, smart devices, and ...
Denial of service is one of the most common threats on the public open networks like Internet which ...
The exponential growth of internet communications and increasing dependency of users upon software-b...
Named Data Networking (NDN) is a promising network architecture being considered as a possible repla...
With the significant growth of the cyber environment over recent years, defensive mechanisms against...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Abstract- During the past few years, huge amount of network attacks have increased the requirement o...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
Due to the exponential growth of E-Business and computing capabilities over the web for a pay-for-us...
Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets ...
Copyright © 2015 P. Amudha et al. This is an open access article distributed under the Creative Comm...
Power system cybersecurity has recently become important due to cyber-attacks. Due to advanced compu...
Intrusion detection has become a main part of network security due to the huge number of attacks whi...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
Now a day’s advancement in technology increases the use of automation, mobility, smart devices, and ...
Denial of service is one of the most common threats on the public open networks like Internet which ...
The exponential growth of internet communications and increasing dependency of users upon software-b...
Named Data Networking (NDN) is a promising network architecture being considered as a possible repla...
With the significant growth of the cyber environment over recent years, defensive mechanisms against...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Abstract- During the past few years, huge amount of network attacks have increased the requirement o...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
Due to the exponential growth of E-Business and computing capabilities over the web for a pay-for-us...