IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects
The fusion of widespread IoT devices, highly adopted cloud services, and advanced network
technologies has laid the foundation of Cyber-Physical Systems. However, the architecture …
technologies has laid the foundation of Cyber-Physical Systems. However, the architecture …
A novel distributed stack ensembled meta-learning-based optimized classification framework for real-time prolific IoT traffic streams
The concurrence of state-of-the-art Industrial 5G, Cyber-Physical Systems, Smart-Systems,
Industrial Internet of Things, and Additive Manufacturing paves the next-level digital …
Industrial Internet of Things, and Additive Manufacturing paves the next-level digital …
Light Weight Gradient Ensemble Model for detecting network attack at the edge of the IoT network
D Santhadevi, B Janet - International Journal of Information Technology, 2023 - Springer
An intelligent malware prediction system is needed for monitoring the network traffic of
traditional and future network attacks. The Internet of Things (IoT) is fully connected and …
traditional and future network attacks. The Internet of Things (IoT) is fully connected and …
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
An SDN/NFV based intelligent fog architecture for DDoS defense in cyber physical systems
The Internet of Things (IoT) has garnered considerable interest in recent years as its
technical capabilities have facilitated the creation of a diverse variety of commercial revenue …
technical capabilities have facilitated the creation of a diverse variety of commercial revenue …
Recent advancements in the state of cloud security in cyber physical systems
Recent advancements in information technology and the ever-increasing sophistication of
digital networks have compelled creating the orchestration of intelligent technologies: cyber …
digital networks have compelled creating the orchestration of intelligent technologies: cyber …
Non-Negative Matrix Factorisation for Feature Selection: A Proposed Approach for the Detection of Multi-Stage Attacks
With the emergence of digital technologies like 5G wireless networks, cloud computing, and
the Internet of Things (IoT), our daily lives, travel, and work have undergone a …
the Internet of Things (IoT), our daily lives, travel, and work have undergone a …
[PDF][PDF] Analisis Insider Threat pada Sistem Keamanan Rumah Cerdas Menggunakan Malicious Traffic Monitoring
Ancaman serangan siber semakin banyak dan kompleks, berdasarkan catatan Badan Siber
dan Sandi Negara (BSSN) bahwa di Indonesia pada tahun 2022 terdapat anomali trafik …
dan Sandi Negara (BSSN) bahwa di Indonesia pada tahun 2022 terdapat anomali trafik …
IoT-POT: Machine Learning-based Detection of Mirai Botnet Attacks in IoT
The Mirai botnet attack has become a serious threat to Internet of Things (IoT) devices
because it can undermine network security by launching large-scale attacks by taking …
because it can undermine network security by launching large-scale attacks by taking …
Performance Evaluation of Path Restoration Techniques in a Network Check for updates
The life during Corona pandemic emphasized network connectivity as a vital requirement.
And due to safety concerns, almost every organization had been shifted to online mode. The …
And due to safety concerns, almost every organization had been shifted to online mode. The …