Picture for Matthias R. Brust

Matthias R. Brust

Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

Add code
Mar 01, 2019
Figure 1 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 2 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 3 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 4 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Viaarxiv icon

Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms

Add code
Sep 02, 2018
Figure 1 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 2 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 3 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 4 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Viaarxiv icon

A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments

Add code
Jul 15, 2016
Figure 1 for A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments
Figure 2 for A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments
Figure 3 for A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments
Figure 4 for A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments
Viaarxiv icon

Consensus Dynamics in a non-deterministic Naming Game with Shared Memory

Add code
Dec 23, 2009
Figure 1 for Consensus Dynamics in a non-deterministic Naming Game with Shared Memory
Figure 2 for Consensus Dynamics in a non-deterministic Naming Game with Shared Memory
Figure 3 for Consensus Dynamics in a non-deterministic Naming Game with Shared Memory
Figure 4 for Consensus Dynamics in a non-deterministic Naming Game with Shared Memory
Viaarxiv icon

Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms

Add code
Jul 20, 2007
Figure 1 for Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms
Viaarxiv icon