8 Questions 43 Answers 0 Followers
Questions related from Hapuarachchige Don Nelaka Shayamal Priyankara
The DDoS attach could detect Statistical based, Soft computing based, Knowledge-based and Data mining and machine learning-based methods. These methods proved that are efficient to detect attacks...
08 October 2020 1,478 4 View
This attack mechanism called a botnet which is illustrated in figure 01. The Botnet has Bot-Master, Command and Control Server, and many numbers of Bots. The Bot-Master is the mastermind behind...
08 October 2020 7,640 4 View
Dear All If you have the hierarchical implementation of the 5G network In the GNS3 simulation environment, Please share. Nelaka
15 September 2020 130 8 View
Software-Defined Networking (SDN) is a promising paradigm that serves as a pillar in the the fifth generation of mobile systems (5G) that could help to detect and mitigate cyber-attacks.
14 September 2020 7,656 5 View
IoT based systems need to connect devices from different locations. Therefore connecting and communicating with each other devices is really important for fast and reliable information to transfer...
09 September 2020 2,314 3 View
PID controllers used in industry to get a good output response. But tuning the PID controller parameters has to do it manually and it takes lots of effort and timing. Therefore fast tuning...
08 September 2020 2,445 8 View
The automatic floor cleaning action of dynamic mechanism and dust removal equipment is controlled by both electric circuits and single-chip microprocessors. For the operation of functionality and...
31 August 2020 3,566 3 View
Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are...
18 August 2020 1,252 8 View