[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Resource management in a peer to peer cloud network for IoT
Abstract Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous
objects in a form of interaction among physical and virtual entities. Large scale of data …
objects in a form of interaction among physical and virtual entities. Large scale of data …
Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine
W Wang, X Du, D Shan, R Qin… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Security issues have resulted in severe damage to the cloud computing environment,
adversely affecting the healthy and sustainable development of cloud computing. Intrusion …
adversely affecting the healthy and sustainable development of cloud computing. Intrusion …
DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …
services, have been subject to abuses and cyber threats. The adversaries constantly search …
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
Cloud computing environments provide users with Internet-based services and one of their
main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a …
main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a …
Encryption as a service for IoT: Opportunities, challenges, and solutions
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization
Cloud computing is a modern technology that has become popular today. A large number of
requests has made it essential to propose a resources allocation framework for arriving …
requests has made it essential to propose a resources allocation framework for arriving …
Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection
The rapid advancement of technologies has enabled businesses to carryout their activities
seamlessly and revolutionised communications across the globe. There is a significant …
seamlessly and revolutionised communications across the globe. There is a significant …
Towards data security assessments using an IDS security model for cyber-physical smart cities
AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …
CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …