Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview

P Nayak, G Swapna - Internet of Things, 2023 - Elsevier
Security is one of the major concerns in IoT networks which consists of a huge number of
objects that have given an alarm with the risen number of threats in our day-to-day life …

[HTML][HTML] A blockchain future for internet of things security: a position paper

M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …

[PDF][PDF] The role of intrusion detection/prevention systems in modern computer networks: A review

S Thapa, A Mailewa - Conference: Midwest Instruction and …, 2020 - micsymposium.org
The emergence of new devices that make use of the Internet as their primary utility has
made network security one of the most important domains in the world today. Intrusions in …

An intrusion detection system on ** of death attacks in IoT networks

A Abdollahi, M Fathi - Wireless Personal Communications, 2020 - Springer
Internet of things (IoT) is almost vulnerable to cyber security attacks due to the limited
computational resources of conventional IoT devices. In this paper, ** of death as a cyber …

Security vulnerabilities and issues of traditional wireless sensors networks in IoT

K Gopalakrishnan - Principles of internet of things (IoT) ecosystem: Insight …, 2020 - Springer
From the past decade, Wireless sensor networks (WSNs) spread out significantly with the
result of technological progress in hardware, software, and micro electro mechanical …

Performance analysis of machine learning techniques in intrusion detection

P Tungjaturasopon, K Piromsopa - proceedings of the 2018 VII …, 2018 - dl.acm.org
This paper presents the performance analysis of machine learning techniques in intrusion
detection. We analyze time to build (and to retrain) the models used by Intrusion Detection …

HTTP Flood DOS Attack Detection on Big Data Using Data Mining

M Haddadi, A Khiat, Y Abidi, Y Derradji - International Conference on …, 2023 - Springer
Nowadays, increasing use of Internet connection, security becomes a huge challenge for
individuals as well as governments and organizations. Therefore, in the last decade, the …

Securing the Multitenancy Paradigm in Cloud Computing: An Exploration of Current Literature.

D Dave, SC Patel, J Chauhan - Grenze International Journal …, 2024 - search.ebscohost.com
Security in multi-tenant databases in cloud computing is a critical aspect, as it ensures that
sensitive data is protected and isolated from other tenants. In a multi-tenant environment …

LSH-XGBoost based Network Congestion Detection Method for SSDN

K Tian, J Wang, Y Liao, D Xu, B Cai - Journal of Physics …, 2020 - iopscience.iop.org
Abstract Signal Safety Data Network (SSDN) is essential to maintain the reliable
transmission between station and station equipment, station and central signal equipment …

Dynamic Shifting of Virtual Network Topologies for Network Attack Prevention

L Avidan - 2019 - search.proquest.com
Computer networks were not designed with security in mind, making research into the
subject of network security vital. Virtual Networks are similar to computer networks, except …