Search Result Save to File Save as CSV
Your search for 46939 returns 4746 document(s)
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Denial-of service attacks rip the internet
Author: Lee Garber | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Denial of service in sensor networks, page 54
Author: Amthony D. W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Metode deteksi serangan distributed denial of service pada layer aplikasi menggunakan model analisa TCP state dan Log akses
Author: Rangga Praduwira; | Call Number: T-1068 (SOFTCOPY T-777) SOURCE CODE T-206 | Edition: 2014 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Metode deteksi dan mitigasi serangan distributed denial-of-service (DDOS) secara dinamis dan terdistribusi pada jaringan openflow
Author: Arisyi Ihsan Fadilah; | Call Number: T-1108 (Softcopy T-817) Source code T-224 | Edition: 2015 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Metode deteksi serangan distributed denial of service menggunakan flow traffic dan algoritma self organizing map
Author: Ahmad Sanmorino; | Call Number: T-1010 (Softcopy T-719) Source code T-161 | Edition: 2013 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan metode entropy untuk deteksi serangan distributed denial of service (DDoS) pada software defined network (SDN) dan dengan penerapan feature selection
Author: Mochamad Teguh Kurniawan; | Call Number: Dis-104 (Softcopy Dis-95) | Type: Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
A Novel Pattern of Distributed Low-Rate Denial of Service Attack Disrupts Internet Routing (119-123)
Author: LIU Xiao-ming LI Qi LIU Xiao-guang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mengintai pelaku cybercrime, page 44
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Recovering from Malicious Attacks in Workflow Systems (14-23)
Author: Yajie Zhu Tai Xin Indrakshi Ray; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next