AUTHOR NAME
mz.agrayasa
16 POSTS
0 COMMENTS
Security Improvements of 4- way Handshake Scheme
As wireless local area networks (WLANs) become more widely deployed due to its transmission rate higher than that of cellular systems and important flexibility,...
Security Verification of 4-way Handshake Protocol
Wireless communications provide higher transmission rate than cellular systems, and are very convenient to deploy with important flexibility. However, many serious security problems obstruct...
Distributed Denial of Service Attacks
We studied distributed denial of service attacks in the Internet such as the widely publicized, distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major...
Detecting SYN Flooding Attacks
The recent attacks on popular web sites like Yahoo, eBay and E*Trade, and their consequent disruption of services have ex- posed the vulnerability of...
Three Counter Defense Mechanism for TCP SYN Flooding Attacks
Internet servers which are giving essential services become the target to many attacks. There are many attacks intended to deprive legitimate users from accessing...
Impact Analysis of Recent DDoS Attacks
The original aim of Internet was to provide an open and scalable network, which could offer easy, fast and inexpensive communication mechanisms, and it...
A Cache Fill and Migration Policy for STT-RAM-Based Multi-Level Hybrid Cache in 3D CMPs
Technologyscalinghasenabledanincreasingnumberofcoresonachipin3DChip-Multiprocessors (CMP). As a result, more cache resources are needed to feed all the cores. With the increase in cache capacity, traditional SRAM consumes...
Multipath propagation and its influence on digital mobile communication systems
In mobile communication systems, the quality of the radio link is the limiting factor of the quality of the end-to-end connection. To obtain a...
Operating System Structure
Operating System is
the software in the first layer that is placed in memory
computer when the
computer is turned on. While other software is run
after the...
Understanding UNIX and History, Characteristics and OS Examples Using UNIX Systems
An OS or operating
system plays a very important role in a computer. As a
operating system
software seems to be a container to regulate the existence...