
Mikoajewska, E., M.D.: E-learning in the education of people with disabilities. Department of Computers and Informatics, FEEI TU of Košice (2013)

In: Proceedings of International Scientific Conference INFORMATICS 2013, pp. Vokorokos, L., Ennert, M., H.M., J.,R.: A survey of parallel intrusion detection on graphical processors. Studies and Materials in Applied Computer Science 4(7), 16–21 (2012) (in Polish) Wrzesien, M., Olejnik, L., R.R.: Ids/ips: Detection and prevention systems of hacking the computer networks. Software Engineering Institute (2000), ĬERT: UDP Port Denial-of-Service Attack. Purdue University Library (1996)ĬERT: TCP SYN Flooding and IP Spoofing Attacks. Schuba, C.L., Krsul, I.H.M.G., Spafford, E.H., S.A.: Analysis of a Denial of Service Attack on TCP. Moor, D., Shannon, C., Brown, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. Rocky, K.C.C.: Defending against flooding-based distributed denial-of-service attacks: A tutorial. (ed.) New Trends in Technologies: Devices, Computer, Communication and Industrial Systems, pp.

Kovac, D., Vince, T., Molnar, J., Kovacova, I.: Modern internet based production technology.
