Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is DoS

Mobile Network Forensics: Emerging Research and Opportunities
Denial of service attack.
Published in Chapter:
Mobile Network Forensics: Investigative Process and Procedures
Copyright: © 2019 |Pages: 37
DOI: 10.4018/978-1-5225-5855-2.ch007
Abstract
A structured investigative approach is essential for an effective production of credible and admissible mobile network evidence. Chapter 2 discussed the ISO/IEC SC27 digital forensic standardization as an effort that helps in developing a robust investigative process, procedures, and methodologies. This chapter applies the ISO/IEC SC27 family of standards for mobile network forensics investigations. Each of the standards is contextualized with the forensic aspects discussed in Chapter 6 together with examples of investigation scenarios, tools, and methods for forensic processing of the mobile network data. These contexts are of practical significance for investigators, elaborating on the approaches for investigative readiness, the techniques and tools for evidence processing from identification to interpretation, and the best practices in handling mobile network evidence data throughout an investigation.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Towards Autonomic Infrastructures via Mobile Agents and Active Networks
Denial of service attacks result in computers consuming their resources for malicious events without being able to further process legitimate user requests
Full Text Chapter Download: US $37.50 Add to Cart
MANET: Enhanced Lightweight Sybil Attack Detection Technique
A Denial of Service (DoS) attack is an attempt to make the network resources unavailable to its intended user. It temporarily or indefinitely suspends/interrupts services of a host connected to the Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Intelligent Systems in Diverse Domains: Digital Transformation
is a cyberattack that floods the victims with fake requests until the systems shut down and block and are unavailable for the victim.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR