A comprehensive study of DDoS attacks over IoT network and their countermeasures
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …
and biosensors those have assisted in the rapid development of implanting wearable …
An experimental analysis of attack classification using machine learning in IoT networks
In recent years, there has been a massive increase in the amount of Internet of Things (IoT)
devices as well as the data generated by such devices. The participating devices in IoT …
devices as well as the data generated by such devices. The participating devices in IoT …
[HTML][HTML] A survey of recommender systems for energy efficiency in buildings: Principles, challenges and prospects
Recommender systems have significantly developed in recent years in parallel with the
witnessed advancements in both internet of things (IoT) and artificial intelligence (AI) …
witnessed advancements in both internet of things (IoT) and artificial intelligence (AI) …
Distributed denial of service attack prediction: Challenges, open issues and opportunities
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …
DDoS attacks have evolved in quantity and volume to evade detection and increase …
Distributed denial of service attacks and its defenses in IoT: a survey
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
Machine learning approach equipped with neighbourhood component analysis for DDoS attack detection in software-defined networking
The Software-Defined Network (SDN) is a new network paradigm that promises more
dynamic and efficiently manageable network architecture for new-generation networks. With …
dynamic and efficiently manageable network architecture for new-generation networks. With …
Federated learning for 6G-enabled secure communication systems: a comprehensive survey
Abstract Machine learning (ML) and Deep learning (DL) models are popular in many areas,
from business, medicine, industries, healthcare, transportation, smart cities, and many more …
from business, medicine, industries, healthcare, transportation, smart cities, and many more …