Denial相关论文
In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment;......
Authentication is the basis of the security of IEEE 802.11i standard.The authentication process in 802.11i involves two ......
在汉语中,有时可把一个或几个词语先放在句首,然后用代词或代称词语在句中代替它(们),同其他词语发生结构关系,作句子成分;那放在......
Construction of a deep seaport in Chittagong and establishment of Chittagong-Kunming rail and road communications have b......
完成这一任务对我并非易事。首先,我是个不善言辞的人,其次,除了生活中最主要的信仰之外,一个人还有如此多的信仰,变化的、零星的......
Your money!How to make it,spend it,save it,invest it,move it,feed it,build it,love it, leave it,chase it,grow it,manage ......
The present paper is intended tu expound the advantages and disadvantages of the traditional Structural Approach in the ......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
Axent Technologies公司的OmniGuard/ITA 3.0是保护网络免受雇员攻击的有效武器,它能实时有效地检测和阻止“黑客”的企图。给ZD......
随着价格低廉的电缆调制解调器和DSL不断流行,以至于最小的办公室也会很快发现自己正在融入开放的Internet。这些高速而费用不高......
eWeek实验室的Openhack.com电子商务站点是在一种安全意识的基础上被建立起来的。这个站点被Guardent安全公司有计划的维持着。但......
在50年代 Roger Corman 拍的科幻电影里,科学狂人俘虏了数以百计的计算机,把它们转变成由隐蔽程序控制的高科技僵尸,再支配这些僵......
A set of discrete points obtained from audit, records on a behavior session is processed with Fourier transform. The cr......
The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address......
确保WindowsServer2003域上的DNS(domainnamesystem——域名解析系统)安全,是非常基本的一个要求。活动目录使用DNS来定位域控制器......
In unstructured peer-to-peer(P2P) systems such as Gnutella,a general routing search algorithm is used to blindly flood a......
Objective In order to explore the features of discrimination against people with HIV/AIDS in rural areas, a community-b......
To enhance the detection accuracy and deduce false positive rate of distributed denial of service (DDoS) attack detectio......
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little......
A novel deterministic packet marking (DPM) for IP traceback against denial of service (DoS) and distributed denial of se......
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communicat......
In this paper, we propose a novel distributed intrusion detection system based on multi-living agent inspired by the res......
When accessing remote services over public networks, a user authentication mechanism is required because these activitie......
In this paper, we will address common psychological reactions to disability such as anxiety, depression, denial, and ang......
根据云计算数据中心网络(data center networks,DCNS)架构的特点,从网络架构的角度对低速率拒绝服务(low-rate denial of service,......
Language is,as it were,the strong reflection of social and cultural phenomenon.One cannot talk at all without immediatel......
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is p......
On detecting primary user emulation attack using channel impulse response in the cognitive radio net
Cognitive radio is an effective technology to alleviate the spectrum resource scarcity problem by opportunistically allo......
Firstly, a multilevel trust algorithm for MANET (mobile ad hoc networks) is presented in this paper and the trust level ......
Deterministic Quantum Secure Direct Communication with Dense Coding and Continuous Variable Operatio
We propose a deterministic quantum secure direct communication protocol by using dense coding.Thetwo check photon seque......
Identifying heavy hitters in a network traffic stream is important for a variety of network applications ranging from tr......
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are pa......
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including interceptrese......
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Cons......
一、背景资料脑损伤后患者不能意识到自身的缺陷即为病觉缺失.文献对此较早已有记载,如19世纪后叶就有关于皮质盲、纯词聋、偏瘫患......
In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and......
随着计算机技术和通信技术的飞速发展,网络安全形势也越来越严峻,如何在海量日志中发现安全攻击是个值得研究的问题,传统的日志分......
针对计算机网络安全问题进行了探讨, 分析了目前最为威胁网络安全的因素, 介绍了网络安全的分类, 综合了一些保证网络安全的措施.......
文章阐述了远程访问VPN应用中进行身份鉴别的目的。提出了一种基于电子钥匙的应用于远程访问VPN的身份鉴别方案。该方案采用电子钥......
本文就现今最热门的网络安全问题DDoS谈谈自己的看法,主要从DDoS的运行原理和攻击方法这二个方面去介绍他的本质,提醒大家对他的危害......
一般认为,公司人格的独立和股东有限责任是公司法人制度的两大基石.然而现实经济生活中,出现了大量偏离公司法人制度的状况,使本应......
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN a......
如何采取有效的策略来重构消费者因为负面宣传被破坏的信任,是企业营销管理的重要内容。本研究通过实验模拟探讨了信任重构策略的......