Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1149-0
Abstract: Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows…
read more here.
Keywords:
network;
denial service;
cloud;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-02556-0
Abstract: In the reliability and security challenges for the Internet of Things (IoT) systems, managing unpredictable events and controlling the abnormal situation automatically are provisioned by the integration of self-healing properties. Despite this, in our knowledge,…
read more here.
Keywords:
protocol cloudiot;
cloudiot available;
distributed denial;
protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-024-84879-y
Abstract: Distributed Denial-of-Service (DDoS) attacks have become a critical issue in cyber security. This can lead to a temporary or even prolonged loss of service for users. These attacks mainly target e-commerce platforms, online services, and…
read more here.
Keywords:
attack;
ddos;
service;
machine learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IET Networks"
DOI: 10.1049/ntw2.12134
Abstract: The authors introduce an unsupervised Intrusion Detection System designed to detect zero‐day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training…
read more here.
Keywords:
zero day;
denial service;
day distributed;
distributed denial ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3013998
Abstract: The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from…
read more here.
Keywords:
software defined;
defined networking;
detection techniques;
controller ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3443142
Abstract: The combination of Software-Defined Networking (SDN) with Unmanned Aerial Vehicles (UAVs) has transformed wireless communication and data transmission. However, this advancement introduces new security challenges, specifically Distributed Denial of Service (DDoS) attacks, which can significantly…
read more here.
Keywords:
architecture;
sdn uav;
sdn;
ensemble learning ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3133479
Abstract: Network slicing is one of the main enablers of the fifth-generation (5G) cellular network. However, it is susceptible to security threats such as distributed denial of service (DDoS) attacks. A DDoS attack on a slice…
read more here.
Keywords:
network;
network slicing;
distributed denial;
deep learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "IEEE Annals of the History of Computing"
DOI: 10.1109/mahc.2021.3072582
Abstract: Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early…
read more here.
Keywords:
distributed denial;
history;
denial service;
service ddos ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Instrumentation and Measurement"
DOI: 10.1109/tim.2025.3556910
Abstract: The advanced metering infrastructure (AMI) that facilitates the monitoring of consumers’ power consumption is vulnerable to various cyberattacks. Among these attacks, distributed denial of service (DDoS) poses a significant threat, disrupting timely and reliable access…
read more here.
Keywords:
detection;
denial service;
metering infrastructure;
game ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Bulletin of Electrical Engineering and Informatics"
DOI: 10.11591/eei.v14i1.8377
Abstract: An attacker can attack a network in several methods when there are a lot of device connections. Distributed denial-of-service (DDoS) attacks could result from this circumstance, which could damage resources and corrupt data. Therefore, irregularity…
read more here.
Keywords:
detection;
denial service;
attack;
distributed denial ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v11i2.pp1498-1509
Abstract: Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over…
read more here.
Keywords:
neural network;
distributed denial;
denial service;
deep learning ... See more keywords