Please provide me some links or documents for the same.
In past, I have worked on HTTP based Low-rate and Slow-rate HTTP DoS attacks. In continuation to that, I want to know about few other similar DoS attacks on layer-7.
06 July 2016 7,254 4 View
I need few reputed journals having very less review processing time in field of Networks & security.
31 December 2015 362 1 View
I am searching for such network attacks which are quite new and current research is going on to propose mitigation techniques for that attack.
10 November 2015 7,087 16 View
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point. Can it be done in case of WPA2 encrypted networks too, i mean the complete four way...
03 April 2015 7,343 3 View
I want to know, on an average, how many wireless clients can be associated to a wireless access point at a time?
03 April 2015 9,109 8 View
I wanted to know when DHCP Server frees an offered (but not allotted) IP address and return it back to the address pool. Is there a time limit? This happens when server doesn't receive the...
02 March 2015 3,476 3 View
According to cisco enterprise mobility, the clients are associated to Access Points using MAC address. So, can an attacker send various DHCPDISCOVER messages using spoofed random source MAC...
02 March 2015 598 7 View
According to cisco enterprise mobility, it is stated that "Even if port security is not an option to stop MAC flooding in wireless networks, the MAC flooding attack is unsuccessful when launched...
02 March 2015 2,961 7 View
While capturing DHCPDISCOVER messages, I found out that some of them are sending these using an IP address. The snapshot for the same is attached:
31 December 2014 5,795 8 View
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
31 December 2014 8,674 2 View
My name is Apurva Saoji. I am a Ph.D scholar in Computer engineering in India. I am looking for international expert in reviewing my PhD thesis, "Competitive Optimization Techniques to Minimize...
07 August 2024 4,600 2 View
Because I have realized that the world tends more and more to do open and free science and there is a trend more and more to choose free databases, free tools and open access platforms.
01 August 2024 10,046 1 View
Difficulty with permittivitt and Magnetic Permeability Calculations Hello everyone, I have all the parameters related to the calculations of the permittivitty and magnetic permeability...
30 July 2024 5,206 1 View
What should a Mechanical Engineering PhD scholar focus on during their PhD to enhance their chances of securing a postdoctoral position?
29 July 2024 7,714 4 View
Our department has recently acquired an HPC (High-Performance Computing) system, and I'm thrilled to take my molecular dynamics calculations to the next level using Desmond. I used to run my...
28 July 2024 6,553 1 View
I intend to explore and assess how offline womens' modern apparel store are losing out online and the need to get them on board based on this assessment. I am on a student on MPHIL Media and...
26 July 2024 1,440 1 View
all math can be traversed by code? all math can be translate to code?
26 July 2024 9,530 0 View
I am reaching out to seek your valuable advice and recommendations regarding the best software tools to use for this research. Specifically, I am looking for software with a user-friendly...
22 July 2024 3,794 1 View
What is climate resilience for food security and sustainable agriculture and how is smart irrigation in agriculture climate resilient?
22 July 2024 1,947 0 View
What is human-computer interaction (HCI)?
22 July 2024 10,056 2 View