Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3101650
Abstract: Distributed Denial of Service (DDoS) attacks represent the most common and critical attacks targeting conventional and new generation networks, such as the Internet of Things (IoT), cloud computing, and fifth-generation (5G) communication networks. In recent…
read more here.
Keywords:
ddos attacks;
application layer;
sdn based;
layer ddos ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3182818
Abstract: In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP…
read more here.
Keywords:
layer;
cuckoo search;
application layer;
app ddos ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3205351
Abstract: Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as…
read more here.
Keywords:
requirements threats;
application layer;
security;
internet things ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3138534
Abstract: Efficient anomaly detection methods are urgently needed to prevent attacks in the application layer of the Industrial Internet of Things (IIoT). The existing intrusion detection systems have certain limitations in detecting abnormal packets exploited by…
read more here.
Keywords:
anomaly detector;
based anomaly;
content agnostic;
payload based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2018.2828849
Abstract: This paper presents an efficient method for data acquisition and automatic meter reading (AMR) system from smart electric meters (SM) using power-line communications (PLC) networks. A PLC network uses existing electrical wiring to simultaneously carry…
read more here.
Keywords:
application layer;
plc networks;
meter reading;
layer approach ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3192966
Abstract: In this article, we propose application layer coding schemes to recover lost data in delay-sensitive uplink (sensor-to-gateway) communications in the Internet of Things. Built on an approach that combines retransmissions and forward erasure correction, the…
read more here.
Keywords:
application layer;
layer coding;
internet things;
data recovery ... See more keywords
Photo by emben from unsplash
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2017.2731521
Abstract: Application layer multicast (ALM) is an effective group communication method. The ALM tree is usually built in a distributed manner because of its good scalability. However, the distributed ALM solution sometimes produces a low performance…
read more here.
Keywords:
solution;
application layer;
alm tree;
optimization ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Parallel and Distributed Systems"
DOI: 10.1109/tpds.2023.3237989
Abstract: In B-IDNC (buffered instantly decodable network coding), each receiver can cache the non-instantly decodable network coded packets (NIDPs) which contain two wanted packets of the network layer for subsequent network decoding, so that more packets…
read more here.
Keywords:
network;
decodable network;
layer;
instantly decodable ... See more keywords