How can heterogeneous internet of things build our future: A survey

T Qiu, N Chen, K Li, M Atiquzzaman… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Heterogeneous Internet of Things (HetIoT) is an emerging research field that has strong
potential to transform both our understanding of fundamental computer science principles …

[HTML][HTML] From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions

S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat… - algorithms, 2017 - mdpi.com
In the past few decades, the rise in attacks on communication devices in networks has
resulted in a reduction of network functionality, throughput, and performance. To detect and …

Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …

Intrusion response systems: Foundations, design, and challenges

Z Inayat, A Gani, NB Anuar, MK Khan… - Journal of Network and …, 2016 - Elsevier
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …

The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks

M Prasad, S Tripathi, K Dahal - Engineering Applications of Artificial …, 2023 - Elsevier
Abstract A Mobile Ad-Hoc Network (MANET) is a widely used temporary network. It is simple
to install and handle. However, its dynamic nature is more vulnerable to routing attacks than …

A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET

R Kolandaisamy, RM Noor, I Kolandaisamy… - Journal of Ambient …, 2021 - Springer
Abstract The strength of Vehicular Ad hoc Networks (VANETs) and the rapid deployment
capability, can be used in many situations where the network should be arranged in a short …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …