Complementing IoT services using software-defined information centric networks: a comprehensive survey

W Rafique, AS Hafid… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
IoT connects a large number of physical objects with the Internet that capture and exchange
real-time information for service provisioning. Traditional network management schemes …

When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks

D Tang, R Dai, Y Yan, K Li, W Liang, Z Qin - ACM Computing Surveys, 2024 - dl.acm.org
Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted
for security vulnerabilities. They have been the significant concern for cyber security …

[HTML][HTML] A graph empowered insider threat detection framework based on daily activities

W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu… - ISA transactions, 2023 - Elsevier
While threats from outsiders are easier to alleviate, effective ways seldom exist to handle
threats from insiders. The key to managing insider threats lies in engineering behavioral …

Nature-inspired intrusion detection system for protecting software-defined networks controller

C Kumar, S Biswas, MSA Ansari, MC Govil - Computers & Security, 2023 - Elsevier
Abstract Software Defined Networks (SDN) is a new emerging networking architecture
facilitated by a separate controller. It has a centralized architecture that serves network …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

Majority voting and feature selection based network intrusion detection system

DR Patil, TM Pattewar - EAI Endorsed Transactions on Scalable Information …, 2022 - eudl.eu
Attackers continually foster new endeavours and attack strategies meant to keep away from
safeguards. Many attacks have an effect on other malware or social engineering to collect …

An efficient neuro deep learning intrusion detection system for mobile adhoc networks

N Venkateswaran, SP Prabaharan - EAI Endorsed Transactions on …, 2022 - eudl.eu
As of late mobile ad hoc networks (MANETs) have turned into a very popular explore the
theme. By giving interchanges without a fixed infrastructure MANETs are an appealing …

Impact of features reduction on machine learning based intrusion detection systems

M Fatima, O Rehman… - EAI Endorsed Transactions …, 2022 - publications.eai.eu
INTRODUCTION: As the use of the internet is increasing rapidly, cyber-attacks over user's
personal data and network resources are on the rise. Due to the easily accessible cyber …

Guest editorial: WWWJ special issue of the 21th international conference on web information systems engineering (WISE 2020)

H Wang, Z Huang - World Wide Web, 2022 - Springer
The 21th International Conference on Web Information Systems Engineering (WISE 2020)
was held in Amsterdam, Netherlands, October 20–24, 2020. It was processed through online …

A Collaborative Programmable LFA Defense Using Temporal Graph Learning in AIoT

Y Li, Y Liu, Y **a, W Zhang, W Quan… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In the current era of rapid advancements in Artificial Intelligence of Things (AIoT), with the
increase in cloud data center operations and the limited security computing capabilities of …