Browsing Computing Other Research by Title
Now showing items 2-3 of 3
-
Performance Comparison of Defense Mechanisms Against TCP SYN Flood DDoS Attack
(ICUMT, 2014)The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing ... -
Security of Wireless Devices using Biological-Inspired RF Fingerprinting Technique
(IGI Global, 2014-11-23)Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...