Search Results - ping floyd~

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2
  3. 3

    Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 2 /

    Published 2016
    Table of Contents: “…Analysis of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation -- Chapter 10. Network Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN -- Chapter 11. …”
    Full-text access
    View in OPAC
    e-Book
  4. 4

    Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 1 /

    Published 2016
    Table of Contents: “…DDA: An Approach to Handle DDoS (Ping Flood) Attack -- Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform -- Chapter 4. …”
    Full-text access
    View in OPAC
    e-Book
  5. 5

    Strain-Hardening Cement-Based Composites SHCC4 /

    Published 2018
    Table of Contents: “…Fantilli -- Influence of fiber type on the tensile behavior of strain-hardening cement-based composites (SHCC) under impact loading, by Iurie Curosu, Viktor Mechtcherine, Daniele Forni,  Ezio Cadoni -- Effect of strain rate and fiber type on tensile behavior of high-strength strain-hardening cement-based composites (HS-SHCC), by Ali Assadzadeh Heravi, Olga Smirnova, Viktor Mechtcherine -- Interphases in cementitious matrix: effect of fibers, sizings, and loading rates, by Christina Scheffler, Serge Zhandarov, Enrico Wölfel, Edith Mäder -- Development a Proper Mix-Design for Impact Loading of Deflection Hardening Hybrid Fiber Reinforced Concrete, by Mohammad Musa Alami, Tahir Kemal Erdem, MertYücel Yardımcı, Serdar Aydın -- The Influence of Multiple Micro-cracking on the Electrical Impedance of an Engineered Cementitious Composite, by D. …”
    Full-text access
    View in OPAC
    e-Book