2011
DOI: 10.1007/978-3-642-25327-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Frequency Domain Combination for Preserving Data in Space Specified Token with High Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Moreover, DDoS attack can be finished based on the solitary node with restricted data flow thereby, cost is highly reduced 9 . Another characteristic is referred that DDoS is target unresponsive attack, since attacked nodes predict the attacker node, thereby it enormously affects cloud computing services 6,10,11 . Moreover, DDoS attacks are many‐to‐one form of DoS attacks, and it is sophisticated in which attacker overcomes the victim resources through sending streams of packets to victim.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, DDoS attack can be finished based on the solitary node with restricted data flow thereby, cost is highly reduced 9 . Another characteristic is referred that DDoS is target unresponsive attack, since attacked nodes predict the attacker node, thereby it enormously affects cloud computing services 6,10,11 . Moreover, DDoS attacks are many‐to‐one form of DoS attacks, and it is sophisticated in which attacker overcomes the victim resources through sending streams of packets to victim.…”
Section: Introductionmentioning
confidence: 99%
“…9 Another characteristic is referred that DDoS is target unresponsive attack, since attacked nodes predict the attacker node, thereby it enormously affects cloud computing services. 6,10,11 Moreover, DDoS attacks are many-to-one form of DoS attacks, and it is sophisticated in which attacker overcomes the victim resources through sending streams of packets to victim. Furthermore, DDoS attack mainly includes size types, namely degree attack rate, adopted model, network scanning approach, degree of automation, degree of impact and propagation model.…”
mentioning
confidence: 99%