Now showing items 1-10 of 39
FUMBOT: Design, Implementation and Detectoin
Year: 2018
Abstract:
their presence on the victim’s device. Botnets are normally used to perform numerous attacks such as spamming, Distributed Denial of Service -DDoS-, identity theft, etc. In this article, we present our FUMBOT botnet which a centralized botnet, able to perform DDoS...
Secondary reserve limitation to wind power penetration in the Spanish power system
Publisher: IEEE
Year: 2014
Influence of magnet shape on torque behavior in surface-mounted permanent magnet motors
Publisher: IEEE
Year: 2014
Precision material engineering — An equipment point of view
Publisher: IEEE
Year: 2014
Improvement of Personal Identification by Flick Input with Acceleration Sensor
Publisher: IEEE
Year: 2014
Current control for the single degree of freedom linear maglev system
Publisher: IEEE
Year: 2014
Can We Beat DDoS Attacks in Clouds?
Publisher: IEEE
Year: 2014
Towards domain-specific Instruction-Set Generation
Publisher: IEEE
Year: 2014
Noise distribution change by gain-saturated semiconductor optical amplifier
Publisher: IEEE
Year: 2014
Android based wireless gesture controlled robot
Publisher: IEEE
Year: 2014