Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "dos" wg kryterium: Temat


Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modelowanie symulacyjne wybranych ataków w cyberprzestrzeni
Simulation modeling of selected attacks in cyberspace
Autorzy:
Pierzchała, D.
Powiązania:
https://bibliotekanauki.pl/articles/404316.pdf
Data publikacji:
2018
Wydawca:
Polskie Towarzystwo Symulacji Komputerowej
Tematy:
cyberzagrożenia
atak DOS
symulacja dyskretna zdarzeniowa
cyber threats
DOS attack
discrete event simulation
Opis:
W pracy poruszono zagadnienia ataków w cyberprzestrzeni opartej na sieciach komputerowych (w tym Internet) oraz urządzeniach IoT. Jedną z metod analizy zagrożeń jest modelowanie i symulacja komputerowa, dające możliwości ilościowej i jakościowej analizy oraz prognoz. W ramach prac powstały kolejne wersje autorskich pakietów do symulacji dyskretnej zdarzeniowej i czynnościowej (DiSSim, DESKit). Skonstruowany został przykładowy model symulacyjny i oprogramowanie, umożliwiające symulację ataku DoS w pewnej instytucji na serwer zabezpieczony przez firewall.
The presented paper addresses the issues of attacks in cyberspace based on computer networks (including the Internet) and IoT devices. One of the methods for the analysis of threats is computer modelling and simulation – it gives the possibility of quantitative and qualitative analysis and forecasting. As a part of the work, next versions of the original discrete event and functional simulation packages were developed (DiSSim, DESKit). The simulation model and relevant software was implemented to simulate DoS attack on a server protected by firewall in an institution. Our further goal is primarily to create a library with rich content of models of devices and behaviour algorithms.
Źródło:
Symulacja w Badaniach i Rozwoju; 2018, 9, 1-2; 59-71
2081-6154
Pojawia się w:
Symulacja w Badaniach i Rozwoju
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Da Revolução dos Cravos à independência de Angola – receção na imprensa polaca. O caso do semanário informativo "Polityka" (1974-1976)
Autorzy:
Działak-Szubińska, Anna
Powiązania:
https://bibliotekanauki.pl/articles/2080215.pdf
Data publikacji:
2021-12-23
Wydawca:
Uniwersytet Warszawski. Wydział Neofilologii
Tematy:
Polityka
imprensa polaca dos anos 70
Revolução dos Cravos
descolonização da África
independência de Angola
Opis:
O artigo apresenta a receção da Revolução dos Cravos e da subsequente descolonização de África, com destaque para o caso angolano, na imprensa polaca com base no semanário informativo Polityka (anos 1974-1976). Analisam-se tanto os artigos mais extensos, como pequenas notas da secção internacional (“Za granicą”). A análise geral do corpus, complementa-se pela análise mais detalhada de um dos artigos sobre Angola. O estudo, tendo em conta as simpatias políticas da Polónia de então, mostra como o interesse pela Revolução dos Cravos resulta em (re)leituras de temas relacionados com a descolonização em forma de reportagens, ensaios, entrevistas e outros.
Źródło:
Itinerarios; 2021, 34; 195-210
1507-7241
Pojawia się w:
Itinerarios
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Performance and Efficiency of Hardware and Software Firewalls
Autorzy:
Konikiewicz, W.
Markowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/108760.pdf
Data publikacji:
2017
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
firewall
virtual firewall
network security
network performance
DoS attacks
Opis:
Firewalls are key elements of network security infrastructure. They should guarantee the proper level of security and, at the same time, the satisfying performance in order to not increase the packet delay in the network. In the paper, we present the comparative study on performance and security of a few firewall technologies including hardware, software and virtual solutions. Three important criteria are considered: the maximal throughput of firewall, the introduced delay and the ability to resist Denial of Service attacks. We report results of experiments, present analysis and formulate a few practical conclusions.
Źródło:
Journal of Applied Computer Science Methods; 2017, 9 No. 1; 49-63
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Logistics goes to fight as first, but comes back as last – motto of Polish Logistics Units
Autorzy:
Wańko, Bogusław
Powiązania:
https://bibliotekanauki.pl/articles/1179506.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Afghanistan
DOS
GIRO base
Polska
Polish Army
army
logistics
supplies
Opis:
The following article is a brief version of “case study” about warfare and its common recognition as a game similar to playing chess by various enthusiasts of the history of Art of War. Its main aim is to show a vivid image of an army in action, with an emphasis on the issue that no military force can act without forage and armoury which must be, more or less, regularly provided. The explanation of how much logistic effort costs to hold even a small unit or garrison full-operational should allow soldiers and civilian researchers to look beyond a schematic image of arms militaris.
Źródło:
World Scientific News; 2017, 78; 351-354
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A technique for DoS attack detection in e-commerce transactions based on ECC and Optimized Support Vector Neural Network
Autorzy:
Shaikh, J. R.
Iliev, G.
Powiązania:
https://bibliotekanauki.pl/articles/1839123.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
cloud computing
e-commerce transactions
DoS attack detection
SVNN
GSO
Opis:
Cloud computing has become a significant area forbusiness due to the high demand from people engaging in commerce and hence, protecting the entities from attacks, like Denial-of-Service (DoS) attacks is essential. Therefore, an effective DoS attack detection technique is required in the e-commerce transactions to provide security in this space. Accordingly, in this paper, a technique is developed for DoS attack detection for the e commerce transactions by proposing Glowworm Swarm Optimization-based Support Vector Neural Network (GSO-SVNN) based authorization. The user and the server, who are registered for accessing the e-commerce web, are first registered and then, authenticated based on Elliptic Curve Cryptography (ECC) encryption with four verification levels follows. The proposed GSO-SVNN classifier, which is developed by incorporating the GSO algorithm in the training procedure of SVNN, determines the class of the user. The performance of the proposed technique is evaluated using four metrics, namely accuracy, precision, recall, and False Positive Rate (FPR), and the experimental results show that the maximum accuracy attained by the proposed DoS attack detection technique is 95.1%. This proves that the proposed technique is effective in detecting DoS attacks in e commerce applications using the proposed GSO-SVNN based authorization.
Źródło:
Control and Cybernetics; 2018, 47, 4; 439-463
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic detection of DoS vulnerabilities of cryptographic protocols
Autorzy:
Krawczyk, U.
Sapiecha, P.
Powiązania:
https://bibliotekanauki.pl/articles/106293.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
automatic detection
DoS
denial of service attacks
Petri net
SPIN model checker
Opis:
In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 51-67
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
O tchiloli santomense - o "chamado de deuses" luso-africano - nas pinceladas teatrais e literárias
Autorzy:
Kalewska, Anna
Powiązania:
https://bibliotekanauki.pl/articles/2081347.pdf
Data publikacji:
2007
Wydawca:
Uniwersytet Warszawski. Wydział Neofilologii
Tematy:
teatro lusófono
tchiloli como expressão de identidade santomense
performance multimedial com características ritualísticas
(des)colonização
antropologia dos espectáculos
Opis:
A Tragédia do Marquês de Mântua de Baltasar Dias (o dramaturgo português da escola pós-vicentina, séc. XVI) teve sucesso em Portugal e tem sobrevivido, até aos nossos dias, na Ilha de S. Tomé, como ritual religioso com elementos da performance teatral, chamado o tchiloli, i. e., o teatro santomense. Entre as hipóteses sobre a sua origem, levantou-se a dos ‘mestres açucareiros’, a de uma estratégia colonial e a da metamorfose do mito dos Descobrimentos Portugueses. O tchiloli apareceu cerca de 1880, sendo a sua base textual moderna o auto cavalheiresco de Baltasar Dias mencionado supra conjugado com um romance em verso, O Marquês de Mântua do Romanceiro (1851) de Almeida Garrett. O tchiloli é um proto-teatro luso-africano. Tornou-se um veículo da identidade santomen-se. É também um drama social com um motivo-chave definido como reposição da justiça. O artigo apresenta algumas propostas de abordagem do fenómeno em causa, rompendo com a ideia do teatro popular de raiz tradicional. A pincelada interpretativa articula-se nas encruzilhadas da antropologia de teatro e da história da literatura. Trata-se da inculturação duma história carolíngia contada e vivida em África em virtude de um duradouro suporte literário e da aculturação africana da religião cristã. A dinâmica interior, a pluralidade cultural e a adaptabilidade à circunstância política e social asseguram ao tchiloli uma longa vida entre os fenómenos mais típicos da cultura lusófona.
Źródło:
Itinerarios; 2007, 5; 35-54
1507-7241
Pojawia się w:
Itinerarios
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Outline of a sociology of intimate troubles: The “passages” of a single self between Evangelicalism and crime
Esboço de uma sociologia dos problemas íntimos: As coabitações e “passagens” de um único self entre evangelismo e crime
Autorzy:
Silva Corrêa, Diogo
Grillo, Barbara
Powiązania:
https://bibliotekanauki.pl/articles/2131641.pdf
Data publikacji:
2022-06-30
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
sociologia dos problemas íntimos
ex-traficante
igreja
pentecostalismo
moralidade
conversão
sociology of intimate problems
trafficking
Church
Pentecostalism
morality
conversion
Opis:
This article is a study on life trajectories and changes of the self of one single person, following the transformation processes that occurred in Rio de Janeiro’s favelas during the last two decades and focusing on the relationship between Evangelicals and drug traffickers. Based on an ethnography of almost two years in Cidade de Deus favela, the trajectory of a single individual, a former drug dealer and a crack addict who switched between the church and the traffic throughout the fieldwork process, is presented in what can be called sociology of intimate troubles or sociology of self-inquiry, that is, a methodology that aims to capture the actors through their problems.
Este artigo é um estudo sobre a trajetória de vida e as modificações de si de um único ator a partir dos processos de transformação ocorridos, nas últimas décadas, nas favelas cariocas, focando-se na relação entre evangélicos e traficantes de droga. Com base em uma etnografia de quase dois anos na Cidade de Deus, defendo que a religião e o tráfico se apresentam sob a modalidade de formas de vida que se emaranham e se transformam mutuamente. Para isso, desenvolvo o que chamo de sociologia dos problemas íntimos, isto é, uma metodologia que visa apreender um único convertido através de seus problemas. Argumento, por fim, que essa análise do processo de transformação, em uma escala bem individual, me permite reelaborar o conceito de conversão para além de um 'conceito nativo' religioso e da narrativa clássica da conversão.
Źródło:
Revista del CESLA. International Latin American Studies Review; 2022, 29; 195-218
1641-4713
Pojawia się w:
Revista del CESLA. International Latin American Studies Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modification of TCP SYN flood (DoS) attack detection algorithm
Modyfikacaja algorytmu wykrywania zmasowanego ataku TCP SYN flood (DoS)
Autorzy:
Halagan, T.
Kováčik, T.
Powiązania:
https://bibliotekanauki.pl/articles/407815.pdf
Data publikacji:
2014
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
DoS
TCP
SYN
flood attack
network security
notification messages
detection module
zmasowany atak
zabezpieczenia sieci
komunikaty powiadamiania
moduł wykrywania
Opis:
This work focuses onto proposal and implementation of modification of SYN flood (DoS) attack detection algorithm. Based on Counting Bloom filter, the attack detection algorithm is proposed and implemented into KaTaLyzer network traffic monitoring tool. TCP attacks can be detected and network administrator can be notified in real-time about ongoing attack by using different notification methods.
Praca koncentruje się na propozycji implementacji modyfikacji algorytmu wykrywania zmasowanego SYN flood (DoS) ataku. Bazując na filtrze typu Counting Bloom, zaproponowano algorytm wykrywania ataku i zaimplementowano w narzędziu monitorowania ruchu w sieci - KaTaLyzer. Ataki TCP mogą być wykrywane i administrator sieci może być powiadamiany w czasie rzeczywistym o przeprowadzanym ataku dzięki różnym metodom powiadamiania.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2014, 3; 75-76
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Manhattan Woodyego Allena. Poetyka Introdukcji
Woody Allens Manhattan. Poetics of the Introduction
Autorzy:
Hendrykowski, Marek
Powiązania:
https://bibliotekanauki.pl/articles/920093.pdf
Data publikacji:
2013-01-13
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
George Gershwin
John Dos Passos
opening sequence
Woody Allen
Gordon Willis
introduction
Manhattan
New York City
film
music
representation
narration
Opis:
Marek Hendrykowski’s innovative study on the four-minute opening sequence to Manhattan analyses one of the most beautiful introductions in the history of world cinema. Its subtle simultaneous construction based on European and American traditions and key canonical texts of 20th-century art: Walther Ruttmann’s Berlin: Symphony of the City, John Dos Passos’s Manhattan Transfer and George Gershwin’s Blue Rapsody. A semiotic apparatus has been included, along with deep explanatory commentaries and close-readings that identify step-by-step the details of its content, contradictory fiction-nonfiction relationships, and the roles of visual image, word and music, narrative, personal point of view, and stream of consciousness technique in the film. The suggestive film overture to Manhattan composed by Woody Allen represents continuities as well as disruptions, sustained between avant-garde artistic tradition and film art of the 1970s.
Źródło:
Images. The International Journal of European Film, Performing Arts and Audiovisual Communication; 2013, 12, 21; 17-31
1731-450X
Pojawia się w:
Images. The International Journal of European Film, Performing Arts and Audiovisual Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cara a unha identidade colectiva: imaxinario e normas de repertorio na poesía galega dos 90
Autorzy:
Cid Fernández, Alba
Powiązania:
https://bibliotekanauki.pl/articles/2079176.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Warszawski. Wydział Neofilologii
Tematy:
theory of systems
memory
identity
community
Galician Poetry of the 90s
teoría sistémica
memoria
identidade
comunidade
poesía galega dos 90
Opis:
Desde que Les cadres sociaux de la mémoire de Halbwachs en 1925 postulou a construción social da memoria colectiva, as Ciencias Sociais non desatenderon os estudos sobre a memoria, xa fose enfocando o seu carácter normativo ou a súa relación coa historia. Hoxe, esta asúmese como un mecanismo de reconstrución e resignificación dos elementos presentes ou incorporábeis ao imaxinario social por intereses diversos. Observando a produción poética galega da década dos 90 (e non só), percíbese a reiteración de certos elementos ligados á historia e á construción da memoria nacional, entre os que podemos atopar desde mencións ao imaxinario atlantista ou medieval, até interdiscursividade e intertextualidade coa literatura popular ou reescrituras da historia literaria. Ao sermos conscientes da ligazón destes marcos coa fabricación das identidades nacionais, e sen deixar de considerar o sistema galego como un sistema se non emerxente, si en loita pola súa definición e contraste, é pertinente cuestionar se certas escollas na produción poética constituíron unha norma de repertorio na altura dos 90. Reformulada por Torres Feijó (2004), esta noción de Itamar Even-Zohar designa aqueles elementos que non delimitan sistemas, pero son promovidos por dotaren de maior xenuinidade os produtos propios dunha comunidade. Nun sistema no que a historiografía e a historia literaria se alicerzaron retroalimentándose, no que a relación entre construción da identidade e construción dun sistema literario propio é decisiva, faise máis nutricia esta revisión.
Źródło:
Itinerarios; 2014, 20; 35-48
1507-7241
Pojawia się w:
Itinerarios
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies