Articles with "application layer" as a keyword



Photo from wikipedia

SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3101650

Abstract: Distributed Denial of Service (DDoS) attacks represent the most common and critical attacks targeting conventional and new generation networks, such as the Internet of Things (IoT), cloud computing, and fifth-generation (5G) communication networks. In recent… read more here.

Keywords: ddos attacks; application layer; sdn based; layer ddos ... See more keywords
Photo by henrylim from unsplash

Application layer DDoS attack detection using Cuckoo Search algorithm-trained Radial Basis Function

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3182818

Abstract: In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP… read more here.

Keywords: layer; cuckoo search; application layer; app ddos ... See more keywords
Photo by scottwebb from unsplash

Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3205351

Abstract: Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as… read more here.

Keywords: requirements threats; application layer; security; internet things ... See more keywords
Photo by stuchy from unsplash

CapBad: Content-Agnostic, Payload-Based Anomaly Detector for Industrial Control Protocols

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3138534

Abstract: Efficient anomaly detection methods are urgently needed to prevent attacks in the application layer of the Industrial Internet of Things (IIoT). The existing intrusion detection systems have certain limitations in detecting abnormal packets exploited by… read more here.

Keywords: anomaly detector; based anomaly; content agnostic; payload based ... See more keywords
Photo from wikipedia

Application-Layer Approach for Efficient Smart Meter Reading in Low-Voltage PLC Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2018.2828849

Abstract: This paper presents an efficient method for data acquisition and automatic meter reading (AMR) system from smart electric meters (SM) using power-line communications (PLC) networks. A PLC network uses existing electrical wiring to simultaneously carry… read more here.

Keywords: application layer; plc networks; meter reading; layer approach ... See more keywords
Photo by larskienle from unsplash

Making the Most of Sporadic Feedback: Low-Complexity Application Layer Coding for Data Recovery in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3192966

Abstract: In this article, we propose application layer coding schemes to recover lost data in delay-sensitive uplink (sensor-to-gateway) communications in the Internet of Things. Built on an approach that combines retransmissions and forward erasure correction, the… read more here.

Keywords: application layer; layer coding; internet things; data recovery ... See more keywords
Photo by emben from unsplash

A Centralized Optimization Solution for Application Layer Multicast Tree

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2017.2731521

Abstract: Application layer multicast (ALM) is an effective group communication method. The ALM tree is usually built in a distributed manner because of its good scalability. However, the distributed ALM solution sometimes produces a low performance… read more here.

Keywords: solution; application layer; alm tree; optimization ... See more keywords
Photo by henrylim from unsplash

Minimizing the Average Packet Access Time of the Application Layer for Buffered Instantly Decodable Network Coding

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Parallel and Distributed Systems"

DOI: 10.1109/tpds.2023.3237989

Abstract: In B-IDNC (buffered instantly decodable network coding), each receiver can cache the non-instantly decodable network coded packets (NIDPs) which contain two wanted packets of the network layer for subsequent network decoding, so that more packets… read more here.

Keywords: network; decodable network; layer; instantly decodable ... See more keywords