Detecting Http Flooding Attacks Based on Uniform Model

Author(s):  
Dalia Nashat ◽  
S. Khairy
2002 ◽  
Author(s):  
Ranga S. Ramanujan ◽  
Doug Harper ◽  
Maher Kaddoura ◽  
David Baca ◽  
John Wu ◽  
...  

2021 ◽  
Vol 8 (1) ◽  
pp. 751-764
Author(s):  
Abdullah Aydeger ◽  
Mohammad Hossein Manshaei ◽  
Mohammad Ashiqur Rahman ◽  
Kemal Akkaya

2017 ◽  
Vol 9 (1) ◽  
Author(s):  
Rafał Wróżyński ◽  
Krzysztof Pyszny ◽  
Mariusz Sojka ◽  
Czesław Przybyła ◽  
Sadżide Murat-Błażejewska

AbstractThe article describes how the Structure-from-Motion (SfM) method can be used to calculate the volume of anthropogenic microtopography. In the proposed workflow, data is obtained using mass-market devices such as a compact camera (Canon G9) and a smartphone (iPhone5). The volume is computed using free open source software (VisualSFMv0.5.23, CMPMVSv0.6.0., MeshLab) on a PCclass computer. The input data is acquired from video frames. To verify the method laboratory tests on the embankment of a known volume has been carried out. Models of the test embankment were built using two independent measurements made with those two devices. No significant differences were found between the models in a comparative analysis. The volumes of the models differed from the actual volume just by 0.7‰ and 2‰. After a successful laboratory verification, field measurements were carried out in the same way. While building the model from the data acquired with a smartphone, it was observed that a series of frames, approximately 14% of all the frames, was rejected. The missing frames caused the point cloud to be less dense in the place where they had been rejected. This affected the model’s volume differed from the volume acquired with a camera by 7%. In order to improve the homogeneity, the frame extraction frequency was increased in the place where frames have been previously missing. A uniform model was thereby obtained with point cloud density evenly distributed. There was a 1.5% difference between the embankment’s volume and the volume calculated from the camera-recorded video. The presented method permits the number of input frames to be increased and the model’s accuracy to be enhanced without making an additional measurement, which may not be possible in the case of temporary features.


Author(s):  
Miguel Pleguezuelos ◽  
Jose´ I. Pedrero ◽  
Miryam B. Sa´nchez

An analytic model to compute the efficiency of spur gears has been developed. It is based on the application of a non-uniform model of load distribution obtained from the minimum elastic potential criterion and a simplified non-uniform model of the friction coefficient along the path of contact. Both conventional and high transverse contact ratio spur gears have been considered. Analytical expressions for the power losses due to friction, for the transmitted power and for the efficiency are presented. From this model, a complete study of the influence of some design parameters (as the number of teeth, the gear ratio, the pressure angle, the addendum modification coefficient, etc.) on the efficiency is presented.


Author(s):  
Xu Chen ◽  
Wei Feng ◽  
Yantian Luo ◽  
Meng Shen ◽  
Ning Ge ◽  
...  

Author(s):  
Jiahao Peng ◽  
Xiaobo Ma ◽  
Jianfeng Li ◽  
Lei Xue ◽  
Wenjun Hu
Keyword(s):  

In this paper we attempt to address Inter-Host Docker container communications security issues by incorporating a latest approach provided by Vault Hashicorp dynamic secret mechanism for managing SSH keys and server credentials. A simulation environment is prepared for Inter-Host container communication consisting of one host running locally and the peer host running as an AWS EC2 instance in cloud. Industry standard monitoring tool Grafana is used in the simulation environment to highlight the security impacts for any organization. We also draw special attention to some of the security vulnerabilities in docker container like ARP spoofing, Integrity of the docker host and containers and MAC flooding attacks. We try to list some best practices to be followed when using docker containers in any production deployments.


Sign in / Sign up

Export Citation Format

Share Document