[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges

PADSN Wijesekara, S Gunawardena - Network, 2023 - mdpi.com
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …

Effect of social influence, environmental awareness, and safety affordance on actual use of 5G technologies among Chinese students

MF Shahzad, S Xu, KI Khan, MF Hasnain - Scientific Reports, 2023 - nature.com
Abstract 5G technology continues to evolve, and its potential to revolutionize various aspects
of society is becoming increasingly evident. However, the successful adoption and utilization …

Develo** an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification

S Pradeep, YK Sharma, UK Lilhore, S Simaiya… - Scientific Reports, 2023 - nature.com
Software-defined networking (SDN) has significantly transformed the field of network
management through the consolidation of control and provision of enhanced adaptability …

[PDF][PDF] Load Balancing in Blockchain Networks: A Survey

P Wijesekara - International Journal of Electrical and Electronic …, 2024 - ijeetc.com
Load Balancing (LB) in networking attempts to minimize the under-utilization and over-
utilization of network resources by distributing the network flows evenly in the …

Blockchain Assisted Secure Smart Home Network using Gradient Based Optimizer with Hybrid Deep Learning Model

L Almuqren, K Mahmood, SS Aljameel… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) refers to a technology enabler to enhance the urban physical
architecture and render public services. But, public access to accumulated heterogeneous …

A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning

FF Alruwaili, MA Alohali, N Aljaffan, AA Alhashmi… - IEEE …, 2024 - ieeexplore.ieee.org
The fast development of smart home devices and the Internet of Things (IoTs) presents
unprecedented accessibility into our day-to-day lives; however, it has also increased major …

[HTML][HTML] A comprehensive survey of honey badger optimization algorithm and meta-analysis of its variants and applications

IH Hassan, M Abdullahi, J Isuwa, SA Yusuf, AT Ibrahim - Franklin Open, 2024 - Elsevier
Metaheuristic algorithms are commonly used in solving complex and NP-hard optimization
problems in various fields. These algorithms have become popular because of their ability to …

CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks

A El-Sayed, AA Toony, F Alqahtani, Y Alginahi… - Computers & …, 2025 - Elsevier
The increasing sophistication of multi-faceted attacks (MFAs) presents significant challenges
for securing Internet of Things (IoT) networks, where traditional defenses and even …

LBTMA: An integrated P4-enabled framework for optimized traffic management in SD-IoT networks

A El-Sayed, W Said, A Tolba, Y Alginahi, AA Toony - Internet of Things, 2024 - Elsevier
This research introduces LBTMA, a novel framework for effective traffic management in
Internet of Things (IoT) networks employing software-defined networking (SDN). LBTMA …