Academic literature on the topic 'SlowDrop attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SlowDrop attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SlowDrop attack"
Cambiaso, Enrico, Giovanni Chiola, and Maurizio Aiello. "Introducing the SlowDrop Attack." Computer Networks 150 (February 2019): 234–49. http://dx.doi.org/10.1016/j.comnet.2019.01.007.
Full textCambiaso, et. al., Enrico. "Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone." International Journal of Computing and Digital Systems 4, no. 3 (July 1, 2015): 165–73. http://dx.doi.org/10.12785/ijcds/040303.
Full textGarcia, Norberto, Tomas Alcaniz, Aurora González-Vidal, Jorge Bernal Bernabe, Diego Rivera, and Antonio Skarmeta. "Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence." Journal of Network and Computer Applications 173 (January 2021): 102871. http://dx.doi.org/10.1016/j.jnca.2020.102871.
Full textDissertations / Theses on the topic "SlowDrop attack"
Náčin, Peter. "Detekce útoku SlowDrop." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442391.
Full textMazánek, Pavel. "Modelování a detekce útoku SlowDrop." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413060.
Full textConference papers on the topic "SlowDrop attack"
Cambiaso, Enrico, Gianluca Papaleo, and Maurizio Aiello. "SlowDroid: Turning a Smartphone into a Mobile Attack Vector." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.72.
Full text