default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,989 matches
- 2025
- Qiyuan Fan, Xue Li, Puming Wang, Xin Jin, Shaowen Yao, Shengfa Miao, Min An, Yuqing Zhao:
IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks. Future Gener. Comput. Syst. 162: 107471 (2025) - 2024
- Loay Abdelrazek, Ramin Fuladi, János Kövér, Leyli Karaçay, Utku Gülen:
Detecting IP DDoS Attacks Using 3GPP Radio Protocols. IEEE Access 12: 24776-24790 (2024) - Yaser Alhasawi, Salem Alghamdi:
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks. IEEE Access 12: 42357-42368 (2024) - Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Eesa Alsolami, Nasir Ayub, Miltiadis D. Lytras:
Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach. IEEE Access 12: 112368-112380 (2024) - Basil AsSadhan, Abdulmuneem Bashaiwth, Hamad Binsalleeh:
Enhancing Explanation of LSTM-Based DDoS Attack Classification Using SHAP With Pattern Dependency. IEEE Access 12: 90707-90725 (2024) - Sandeep Dasari, Rajesh Kaluri:
An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization Techniques. IEEE Access 12: 10834-10845 (2024) - Olufunsho I. Falowo, Murat Ozer, Chengcheng Li, Jacques Bou Abdo:
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study. IEEE Access 12: 39221-39237 (2024) - Sripriyanka G, Anand Mahendran:
Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification. IEEE Access 12: 17328-17348 (2024) - Ayaz Hussain, Eva Marín-Tordera, Xavi Masip-Bruin, Helen C. Leligou:
Rule-Based With Machine Learning IDS for DDoS Attack Detection in Cyber-Physical Production Systems (CPPS). IEEE Access 12: 114894-114911 (2024) - Daniel M. Brandão Lent, Vitor G. da Silva Ruffo, Luiz Fernando Carvalho, Jaime Lloret, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.:
An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN. IEEE Access 12: 70690-70706 (2024) - Makhduma Saiyed, Irfan S. Al-Anbagi:
A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks. IEEE Access 12: 25623-25641 (2024) - Saravanan Selvam, Uma Maheswari Balasubramanian:
UASDAC: An Unsupervised Adaptive Scalable DDoS Attack Classification in Large-Scale IoT Network Under Concept Drift. IEEE Access 12: 64701-64716 (2024) - Mohammad Javad Shayegan, Amirreza Damghanian:
A Method for DDoS Attacks Prevention Using SDN and NFV. IEEE Access 12: 108176-108184 (2024) - Chin-Shiuh Shieh, Fu-An Ho, Mong-Fong Horng, Thanh-Tuan Nguyen, Prasun Chakrabarti:
Open-Set Recognition in Unknown DDoS Attacks Detection With Reciprocal Points Learning. IEEE Access 12: 56461-56476 (2024) - Heyu Wang, Yixuan Li:
Overview of DDoS Attack Detection in Software-Defined Networks. IEEE Access 12: 38351-38381 (2024) - Mehdi Ebady Manaa, Saba M. Hussain, Suad A. Alasadi, Hussein A. A. Al-Khamees:
DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments. Inteligencia Artif. 27(74): 152-165 (2024) - Ahamed Ali Samsu Aliar, Moorthy Agoramoorthy, Y. Justindhas:
An Automated Detection of DDoS Attack in Cloud Using Optimized Weighted Fused Features and Hybrid DBN-GRU Architecture. Cybern. Syst. 55(7): 1469-1510 (2024) - Naziya Aslam, Shashank Srivastava, M. M. Gore:
DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN. Comput. Electr. Eng. 117: 109282 (2024) - David Chunhu Li, Hsuan-Hao Tu, Li-Der Chou:
Cross-layer detection and defence mechanism against DDoS and DRDoS attacks in software-defined networks using P4 switches. Comput. Electr. Eng. 118: 109307 (2024) - M. I. Thariq Hussan, G. Vinoda Reddy, P. T. Anitha, A. Kanagaraj, P. Naresh:
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization. Clust. Comput. 27(4): 4469-4490 (2024) - Reza Fallahi Kapourchali, Reza Mohammadi, Mohammad Nassiri:
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch. Clust. Comput. 27(6): 8047-8064 (2024) - Pooja Kumari, Ankit Kumar Jain:
Timely detection of DDoS attacks in IoT with dimensionality reduction. Clust. Comput. 27(6): 7869-7887 (2024) - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. Clust. Comput. 27(2): 1471-1490 (2024) - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks. Clust. Comput. 27(5): 6397-6424 (2024) - Rana Abu Bakar, Lorenzo De Marinis, Filippo Cugini, Francesco Paolucci:
FTG-Net-E: A hierarchical ensemble graph neural network for DDoS attack detection. Comput. Networks 250: 110508 (2024) - Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024) - Osama S. Younes:
A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems. Comput. Networks 240: 110146 (2024) - Usman Haruna Garba, Adel Nadjaran Toosi, Muhammad Fermi Pasha, Suleman Khan:
SDN-based detection and mitigation of DDoS attacks on smart homes. Comput. Commun. 221: 29-41 (2024) - Mohamed Ali Setitra, Mingyu Fan, Ilyas Benkhaddra, Zine El Abidine Bensalem:
DoS/DDoS attacks in Software Defined Networks: Current situation, challenges and future directions. Comput. Commun. 222: 77-96 (2024) - Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024)
skipping 1,959 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-19 16:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint