Skip to Main Content
Keywords: Web application
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Web Information Systems (2011) 7 (4): 381–395.
Published: 22 November 2011
...‐time web application; previously, the web server alone was responsible for manipulating the behavior of all the game characters. As more users logged in, the workload on the server was increased. Hence, the authors have implemented a technique whereby the CPU load of the server is distributed among...
Journal Articles
International Journal of Web Information Systems (2006) 2 (1): 37–44.
Published: 01 February 2006
... is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment...

or Create an Account

Close Modal
Close Modal