15 research outputs found
Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches
10.1016/0020-0190(96)00064-6Information Processing Letters585231-236IFPL
Unsuccessful Search in Self-Adjusting Data Structures
10.1006/jagm.1993.1049Journal of Algorithms153447-481JOAL
Efficiency of SS(l) square-and-multiply exponentiation algorithms
10.1049/el:19941424Electronics Letters30252115-2116ELLE
Efficient nearer-ancestor algorithm for network routing
10.1016/S0140-3664(96)01143-7Computer Communications19121014-1019COCO
Fast square-and-multiply exponentiation for RSA
10.1049/el:19940949Electronics Letters30171396-1397ELLE
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
Distributed Denial-of-Service (DDoS) attack has turned into one of the major security threads in recent years. Usually the only solution is to stop the services or shut down the victim and then discard the attack traffic only after the DDoS attack characteristics (such as the destination ports of the attack packets) are known. In this paper, we introduce a generic DDoS attack detection mechanism as well as the design and setup of a testbed for performing experiments and analysis. Our results showed that the mechanism can detect DDoS attack. This enable us to proceed to the next steps of packet classification and traffic control
Особенности реализации договора страхования предпринимательского риска в современных условиях
Жучков Сергей Викторович. Особенности реализации договора страхования предпринимательского риска в современных условиях [Электронный ресурс] / С. В. Жучков// Современные риски и право: правовые средства предупреждения, управления, защиты. - Москва : РГГУ, 2018. - С. 317-325