LEADER 01242nam0-2200385---450- 001 990008698430403321 005 20090116082549.0 035 $a000869843 035 $aFED01000869843 035 $a(Aleph)000869843FED01 035 $a000869843 100 $a20080829d2001----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa-------001yy 200 1 $aSperimentare l'architettura$eGuarini, Juvarra, Alfieri, Borra e Vittone$fa cura di Giuseppe Dardanello$gfotografie di Pino Dell'Aquila$gsaggi e contributi di Valentina Assandria ... [et al.] 210 $aTorino$cFondazione CRT$dc2001 215 $a365 p.$cill.$d30 cm 225 1 $aArte in Piemonte$v15 610 0 $aArchitettura$aTorino$aSec. 17.-18. 610 0 $aAlfieri, Benedetto 610 0 $aBorra, Giovanni Battista <1713-1770> 610 0 $aGuarini, Guarino 610 0 $aJuvarra, Filippo 610 0 $aVittone, Bernardo Antonio 702 1$aAssandria,$bValentina 702 1$aDardanello,$bGiuseppe 702 1$aDell?Aquila,$bPino 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008698430403321 952 $a12.323$b4688$fDARST 959 $aDARST 996 $aSperimentare l'architettura$9719332 997 $aUNINA LEADER 03172nam 2200529 450 001 9910554226703321 005 20230629233309.0 010 $a3-11-061975-X 024 7 $a10.1515/9783110619751 035 $a(CKB)5590000000532519 035 $a(DE-B1597)527572 035 $a(DE-B1597)9783110619751 035 $a(MiAaPQ)EBC6701291 035 $a(Au-PeEL)EBL6701291 035 $a(OCoLC)1262307826 035 $a(EXLCZ)995590000000532519 100 $a20220502d2021 uy 0 101 0 $aeng 135 $aur||#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDistributed denial of service attacks $econcepts, mathematical and cryptographic solutions /$fedited by Rajeev Singh and Mangey Ram 210 1$aBerlin ;$aBoston :$cDe Gruyter,$d[2021] 210 4$dİ2021 215 $a1 online resource (XIV, 218 p.) 225 1 $aDe Gruyter series on the applications of mathematics in engineering and information sciences ;$v6 300 $aIncludes index. 311 1 $a3-11-061675-0 327 $tFrontmatter --$tPreface --$tAcknowledgments --$tAbout the Editors --$tContents --$tList of contributors --$tImpact evaluation of DDoS and Malware attack using IoT devices --$tUnderstanding and implementation of machine learning using support vector machine for efficient DDoS attack detection --$tCryptographic method based on Catalan objects and enumerative chess problem --$tDistributed denial-of-service attacks and mitigation in wireless sensor networks --$tNew techniques for DDoS attacks mitigation in resource-constrained networks --$tDetection and behavioral analysis of botnets using honeynets and classification techniques --$tSelected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks --$tProbability, queuing, and statistical perspective in the distributed denial-of-service attacks domain --$tFrequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks --$tUtilization of puzzles for protection against DDoS attacks --$tIndex 330 $aThis book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks. 410 0$aDe Gruyter series on the applications of mathematics in engineering and information sciences ;$v6. 606 $aDenial of service attacks 606 $aComputer networks$xSecurity measures 615 0$aDenial of service attacks. 615 0$aComputer networks$xSecurity measures. 676 $a005.87 686 $aGM 5294$qDE-25/sred20$2rvk 702 $aSingh$b Rajeev 702 $aRam$b Mangey 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910554226703321 996 $aDistributed Denial of Service Attacks$92819012 997 $aUNINA