![](images/graphics/blank.gif)
Attack solutions
-
TCP-targeted low-rate distributed denial-of-service (LDDoS) attacks pose a serious challenge to the reliability and security of the Internet. Among various proposed solutions, we are particularly interested in the Congestion Participation Rate (CPR) metric and the CPR-based approach.
17p
viambani
18-06-2024
2
1
Download
-
In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.
13p
viamancio
04-06-2024
0
0
Download
-
Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.
268p
longtimenosee05
31-03-2024
4
0
Download
-
Ebook Cross site scripting attacks: XSS exploits and defense – Part 1 includes contents: Chapter 1: cross-site scripting fundamentals solutions, chapter 2: the XSS discovery toolkit, chapter 3: XSS theory, chapter 4: XSS attack methods, chapter 5: advanced XSS attack vectors.
234p
haojiubujain010
14-12-2023
2
1
Download
-
The first aim of this document is to present how buffer overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as efficiency or performance loss.
102p
haojiubujain010
14-12-2023
1
0
Download
-
Ebook Hack attacks testing: How to conduct your own security audit - Part 1 includes contents: Chapter 1: Basic windows 2000/windows 2000 server installation and configuration, chapter 2 basic linux and solaris installations and configurations, chapter 3 mac OS X tiger box solutions, chapter 4 installing and configuring a testing target, chapter 5 cerberus internet scanner, chapter 6 cybercop scanner, chapter 7 internet scanner, chapter 8 security threat avoidance technology scanner, chapter 9 tigersuite 4.0.
309p
haojiubujain010
14-12-2023
13
2
Download
-
Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.
397p
haojiubujain010
14-12-2023
7
2
Download
-
Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.
233p
haojiubujain010
14-12-2023
6
2
Download
-
Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1 includes contents: Chapter 1 hacking web apps 101, chapter 2 profiling, chapter 3 hacking web platforms, chapter 4 attacking web authentication, chapter 5 attacking web authorization.
248p
haojiubujain010
14-12-2023
3
1
Download
-
Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) – Part 2 includes contents: Chapter 5 authentication; chapter 6 authorization; chapter 7 attacking session state management; chapter 8 input validation attacks; chapter 9 attacking web datastores; chapter 10 attacking web services; chapter 11 hacking web application management; chapter 12 web client hacking; chapter 13 case studies; appendixes a web site security checklist; appendixes b web hacking tools and techniques cribsheet; appendixes c using libwhisker; appendixes d urlscan installa...
261p
haojiubujain010
14-12-2023
1
1
Download
-
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.
230p
haojiubujain010
14-12-2023
11
1
Download
-
Ebook "Optimizing and maintaining a database administration solution using microsoft SQL"includes content: Troubleshooting database and server performance, analyzing queries, failure diagnosis, disaster recovery, performance monitoring, database maintenance, design data integrity, SQL server integration services, business requirements, replication, security strategies, detecting and responding to attacks.
775p
haojiubujain07
20-09-2023
5
4
Download
-
The research studies solutions to overcome technical barriers for seafood products exported from Vietnam to the Japanese market. The authors used the TOWS matrix to analyze opportunities and challenges from technical barriers to trade of Japan for seafood exports and the strengths and weaknesses of Vietnamese seafood enterprises in meeting Japanese technical barriers.
10p
vimulcahy
18-09-2023
6
4
Download
-
In this paper, we propose an efficient distributed denial-of-service (DDoS) attack deFEnse solution, namely SAFE–which utilizes an elastic traffic flow inspection mechanism, for Software-Defined Networking (SDN) based data centers.
16p
vimulcahy
18-09-2023
4
3
Download
-
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333p
haojiubujain06
05-09-2023
2
2
Download
-
In this article, the authors propose a solution to improve the security of digital signature schemes, implemented in both levels of digital signatures. At the first level, the authors propose a new hard problem - different from the hard problems used before and hasn’t been solved by anyone so far (except by "brute force attack" method).
11p
viargus
20-02-2023
2
2
Download
-
The understanding of the asymptotic behavior of dynamical systems is one of the most important problems of modern mathematical physics. One way to attack the problem for a dissipative dynamical system is to consider its global attractor. This is an invariant set that attracts all the trajectories of the system. In the paper "Global existence and long-time behavior of solutions to a class of degenerate parabolic equations" we study the following semilinear degenerate parabolic equation with variable.
14p
runordie3
27-06-2022
10
3
Download
-
This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. The main idea is to maintain maximum sized cliques required for location cloaking in an undirected graph.
19p
spiritedaway36
28-11-2021
15
3
Download
-
In the 4.0 technology wave, Blockchain is considered by the technology world to be the most noteworthy advancement after the birth of Internet. The findings of this paper will find out about Blockchain and Bitcoin Cryptocurrency. Along with that, we will mention to a weak point of Blockchain- Double spending and research on security against attacks including Double spending hypothesis attacks and attack resistance in practice help Blockchain apply for Bitcoin cryptocurrency.
13p
huyetthienthan
23-11-2021
12
3
Download
-
With the advancement of technology, the Internet of Things has become a major part in our daily life. It brought up unbelievable influences, potential and growth to human’s society. IoT allows wearable devices, home appliances and software to share and communicate throughout a network using the Internet. Due to the fact that all of a user's private data will be uploaded on the Internet, we must keep an eye on security problems caused by IoT.
9p
huyetthienthan
23-11-2021
34
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)