Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges
N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …
broad network access, rapid elasticity, and measured service) are being exploited by …
Traceability in supply chains: A Cyber security analysis
Digital technologies are increasingly being adopted in modern supply chains for product
traceability, enabling data sharing amongst trading partners, quick availability of product …
traceability, enabling data sharing amongst trading partners, quick availability of product …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
JESS: Joint entropy-based DDoS defense scheme in SDN
Software-defined networking (SDN) is a communication paradigm that brings cost efficiency
and flexibility through software-defined functions resident on centralized controllers …
and flexibility through software-defined functions resident on centralized controllers …
DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks
M Premkumar, TVP Sundararajan - Microprocessors and Microsystems, 2020 - Elsevier
Abstract Wireless Sensor Networks (WSNs) include small battery-based self-governing
devices that are deployed in a distributed manner to supervise the environmental or physical …
devices that are deployed in a distributed manner to supervise the environmental or physical …
A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network
Y Gao, H Wu, B Song, Y **, X Luo, X Zeng - IEEE Access, 2019 - ieeexplore.ieee.org
Security assurance in Vehicular Ad hoc Network (VANET) is a crucial and challenging task
due to the open-access medium. One great threat to VANETs is Distributed Denial-of …
due to the open-access medium. One great threat to VANETs is Distributed Denial-of …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
Software-defined edge defense against IoT-based DDoS
M Özçelik, N Chalabianloo… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Industries, people's activities and urban infrastructure rely more and more on" Internet of
Things"(IoT) devices for all kinds of activities and operations. Although securing a computer …
Things"(IoT) devices for all kinds of activities and operations. Although securing a computer …
A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks
A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed)
Denial of Service Attacks Page 1 Information Technology and Control 2022/1/51 180 A …
Denial of Service Attacks Page 1 Information Technology and Control 2022/1/51 180 A …
A novel feature-based framework enabling multi-type DDoS attacks detection
Abstract Distributed Denial of Service (DDoS) attacks are among the most severe threats in
cyberspace. The existing methods are only designed to decide whether certain types of …
cyberspace. The existing methods are only designed to decide whether certain types of …