Digital Library
Search Results: [ keyword: Attack ] (108)
Muhammad Daniel Hafiz Abdullah,
Zurina Mohd Hanapi,
Zuriati Ahmad Zukarnain,
Mohamad Afendee Mohamed,
Vol. 9, No. 4, April 29, 2015
10.3837/tiis.2015.04.013
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Ahmad Karim,
Syed Adeel Ali Shah,
Rosli Bin Salleh,
Muhammad Arif,
Rafidah Md Noor,
Shahaboddin Shamshirband,
Vol. 9, No. 4, April 29, 2015
10.3837/tiis.2015.04.012
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Wan-Li Lyu,
Chin-Chen Chang,
Thai-Son Nguyen,
Chia-Chen Lin,
Vol. 8, No. 10, October 30, 2014
10.3837/tiis.2014.10.018
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
88.
A Pioneer Scheme in the Detection and Defense of DrDoS Attack Involving Spoofed Flooding Packets
Kavisankar L,
Chellappan C,
Sivasankar P,
Ashwin Karthi1,
Srinivas A,
Vol. 8, No. 5, May 28, 2014
10.3837/tiis.2014.05.013
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Jingyu Feng,
Yuqing Zhang,
Guangyue Lu,
Liang Zhang,
Vol. 8, No. 1, January 28, 2014
10.3837/tiis.2014.01.001
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Junghyun Nam,
Kim-Kwang Raymond Choo,
Moonseong Kim,
Juryon Paik,
Dongho Won,
Vol. 7, No. 12, December 28, 2013
10.3837/tiis.2013.12.016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)