Search Result
Save to File
Your search for
46939
returns
4746
document(s)
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Denial-of service attacks rip the internet
Author: Lee Garber | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Denial of service in sensor networks, page 54
Author: Amthony D. W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode deteksi serangan distributed denial of service pada layer aplikasi menggunakan model analisa TCP state dan Log akses
Author: Rangga Praduwira; | Call Number: T-1068 (SOFTCOPY T-777) SOURCE CODE T-206 | Edition: 2014 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode deteksi dan mitigasi serangan distributed denial-of-service (DDOS) secara dinamis dan terdistribusi pada jaringan openflow
Author: Arisyi Ihsan Fadilah; | Call Number: T-1108 (Softcopy T-817) Source code T-224 | Edition: 2015 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode deteksi serangan distributed denial of service menggunakan flow traffic dan algoritma self organizing map
Author: Ahmad Sanmorino; | Call Number: T-1010 (Softcopy T-719) Source code T-161 | Edition: 2013 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan metode entropy untuk deteksi serangan distributed denial of service (DDoS) pada software defined network (SDN) dan dengan penerapan feature selection
Author: Mochamad Teguh Kurniawan; | Call Number: Dis-104 (Softcopy Dis-95) | Type: Disertasi
Find Similar
|
Add To Favorites
|
Detail in New Window
A Novel Pattern of Distributed Low-Rate Denial of Service Attack Disrupts Internet Routing (119-123)
Author: LIU Xiao-ming LI Qi LIU Xiao-guang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Mengintai pelaku cybercrime, page 44
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Recovering from Malicious Attacks in Workflow Systems (14-23)
Author: Yajie Zhu Tai Xin Indrakshi Ray; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next