Software-defined network (SDN) data plane security: issues, solutions, and future directions
Software-defined network (SDN) radically changes the network architecture by decoupling
the network logic from the underlying forwarding devices. This architectural change …
the network logic from the underlying forwarding devices. This architectural change …
The State of the art tools and techniques for remote digital forensic investigations
G Shobana - 2021 3rd International Conference on Signal …, 2021 - ieeexplore.ieee.org
Remote forensic techniques are widely searched in these days for its response capability in
providing a way to perform evaluation of potentially compromised devices without physically …
providing a way to perform evaluation of potentially compromised devices without physically …
Behavioral based insider threat detection using deep learning
The most detrimental cyber attacks are usually not originated by malicious outsiders or
malware but from trusted insiders. The main advantage insider attackers have over external …
malware but from trusted insiders. The main advantage insider attackers have over external …
Authentication protocol for cloud databases using blockchain mechanism
Cloud computing has made the software development process fast and flexible but on the
other hand it has contributed to increasing security attacks. Employees who manage the …
other hand it has contributed to increasing security attacks. Employees who manage the …
Cost optimization of secure routing with untrusted devices in software defined networking
Over the years, switches and network routers have been compromised frequently, and a lot
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …
Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …
range of things and many types of communication technologies to share information. This …
Threats From Unintentional Insiders: An assessment of an organization's readiness using machine learning
Today's organisations are facing a number of challenges, one of the most significant of
which is ensuring the safety of their digital data. This is as a result of the fact that they are …
which is ensuring the safety of their digital data. This is as a result of the fact that they are …
[PDF][PDF] Research Article Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques
Wireless sensor networks have attracted an extraordinary amount of attention from the
scientific community over the course of the last several years. A typical wireless sensor …
scientific community over the course of the last several years. A typical wireless sensor …
Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain
Computing on the cloud has changed the working of mankind in every manner, from storing
to fetching every information on the cloud. To protect data on the cloud various access …
to fetching every information on the cloud. To protect data on the cloud various access …
Access Control Mechanism for Prevention of Insider Threat in Distributed Cloud Environment
Cloud computing has revolutionized data storage and ensured availability of data and
storage on demand. Employees in a cloud service environment manage data storage …
storage on demand. Employees in a cloud service environment manage data storage …