Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1149-0
Abstract: Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows…
read more here.
Keywords:
network;
denial service;
cloud;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-02556-0
Abstract: In the reliability and security challenges for the Internet of Things (IoT) systems, managing unpredictable events and controlling the abnormal situation automatically are provisioned by the integration of self-healing properties. Despite this, in our knowledge,…
read more here.
Keywords:
protocol cloudiot;
cloudiot available;
distributed denial;
protocol ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3013998
Abstract: The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from…
read more here.
Keywords:
software defined;
defined networking;
detection techniques;
controller ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3133479
Abstract: Network slicing is one of the main enablers of the fifth-generation (5G) cellular network. However, it is susceptible to security threats such as distributed denial of service (DDoS) attacks. A DDoS attack on a slice…
read more here.
Keywords:
network;
network slicing;
distributed denial;
deep learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2022 at "IEEE Annals of the History of Computing"
DOI: 10.1109/mahc.2021.3072582
Abstract: Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early…
read more here.
Keywords:
distributed denial;
history;
denial service;
service ddos ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v11i2.pp1498-1509
Abstract: Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over…
read more here.
Keywords:
neural network;
distributed denial;
denial service;
deep learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147717741463
Abstract: Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article,…
read more here.
Keywords:
attack;
denial service;
distributed denial;
mitigation techniques ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Energies"
DOI: 10.3390/en16083572
Abstract: Machine learning (ML) is efficiently disrupting and modernizing cities in terms of service quality for mobility, security, robotics, healthcare, electricity, finance, etc. Despite their undeniable success, ML algorithms need crucial computational efforts with high-speed computing…
read more here.
Keywords:
machine;
ddos;
machine learning;
distributed denial ... See more keywords