5.4 C
Munich
Sunday, April 11, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

mz.agrayasa

16 POSTS
0 COMMENTS

Security Improvements of 4- way Handshake Scheme

As wireless local area networks (WLANs) become more widely deployed due to its transmission rate higher than that of cellular systems and important flexibility,...

Security Verification of 4-way Handshake Protocol

Wireless communications provide higher transmission rate than cellular systems, and are very convenient to deploy with important flexibility. However, many serious security problems obstruct...

Distributed Denial of Service Attacks

We studied distributed denial of service attacks in the Internet such as the widely publicized, distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major...

Detecting SYN Flooding Attacks

The recent attacks on popular web sites like Yahoo, eBay and E*Trade, and their consequent disruption of services have ex- posed the vulnerability of...

Three Counter Defense Mechanism for TCP SYN Flooding Attacks

Internet servers which are giving essential services become the target to many attacks. There are many attacks intended to deprive legitimate users from accessing...

Impact Analysis of Recent DDoS Attacks

The original aim of Internet was to provide an open and scalable network, which could offer easy, fast and inexpensive communication mechanisms, and it...

A Cache Fill and Migration Policy for STT-RAM-Based Multi-Level Hybrid Cache in 3D CMPs

Technologyscalinghasenabledanincreasingnumberofcoresonachipin3DChip-Multiprocessors (CMP). As a result, more cache resources are needed to feed all the cores. With the increase in cache capacity, traditional SRAM consumes...

Multipath propagation and its influence on digital mobile communication systems

In mobile communication systems, the quality of the radio link is the limiting factor of the quality of the end-to-end connection. To obtain a...

Operating System Structure

Operating System is the software in the first layer that is placed in memory computer when the computer is turned on. While other software is run after the...

Understanding UNIX and History, Characteristics and OS Examples Using UNIX Systems

An OS or operating system plays a very important role in a computer. As a operating system software seems to be a container to regulate the existence...

Latest news

- Advertisement -spot_img
Enable referrer and click cookie to search for pro webber