15 research outputs found

    Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches

    No full text
    10.1016/0020-0190(96)00064-6Information Processing Letters585231-236IFPL

    Unsuccessful Search in Self-Adjusting Data Structures

    No full text
    10.1006/jagm.1993.1049Journal of Algorithms153447-481JOAL

    Efficiency of SS(l) square-and-multiply exponentiation algorithms

    No full text
    10.1049/el:19941424Electronics Letters30252115-2116ELLE

    Efficient nearer-ancestor algorithm for network routing

    No full text
    10.1016/S0140-3664(96)01143-7Computer Communications19121014-1019COCO

    Fast square-and-multiply exponentiation for RSA

    No full text
    10.1049/el:19940949Electronics Letters30171396-1397ELLE

    IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks

    No full text
    Distributed Denial-of-Service (DDoS) attack has turned into one of the major security threads in recent years. Usually the only solution is to stop the services or shut down the victim and then discard the attack traffic only after the DDoS attack characteristics (such as the destination ports of the attack packets) are known. In this paper, we introduce a generic DDoS attack detection mechanism as well as the design and setup of a testbed for performing experiments and analysis. Our results showed that the mechanism can detect DDoS attack. This enable us to proceed to the next steps of packet classification and traffic control

    Особенности реализации договора страхования предпринимательского риска в современных условиях

    Get PDF
    Жучков Сергей Викторович. Особенности реализации договора страхования предпринимательского риска в современных условиях [Электронный ресурс] / С. В. Жучков// Современные риски и право: правовые средства предупреждения, управления, защиты. - Москва : РГГУ, 2018. - С. 317-325
    corecore