Complementing IoT services using software-defined information centric networks: a comprehensive survey
W Rafique, AS Hafid… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
IoT connects a large number of physical objects with the Internet that capture and exchange
real-time information for service provisioning. Traditional network management schemes …
real-time information for service provisioning. Traditional network management schemes …
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks
Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted
for security vulnerabilities. They have been the significant concern for cyber security …
for security vulnerabilities. They have been the significant concern for cyber security …
[HTML][HTML] A graph empowered insider threat detection framework based on daily activities
While threats from outsiders are easier to alleviate, effective ways seldom exist to handle
threats from insiders. The key to managing insider threats lies in engineering behavioral …
threats from insiders. The key to managing insider threats lies in engineering behavioral …
Nature-inspired intrusion detection system for protecting software-defined networks controller
Abstract Software Defined Networks (SDN) is a new emerging networking architecture
facilitated by a separate controller. It has a centralized architecture that serves network …
facilitated by a separate controller. It has a centralized architecture that serves network …
Graph intelligence enhanced bi-channel insider threat detection
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …
Majority voting and feature selection based network intrusion detection system
Attackers continually foster new endeavours and attack strategies meant to keep away from
safeguards. Many attacks have an effect on other malware or social engineering to collect …
safeguards. Many attacks have an effect on other malware or social engineering to collect …
An efficient neuro deep learning intrusion detection system for mobile adhoc networks
As of late mobile ad hoc networks (MANETs) have turned into a very popular explore the
theme. By giving interchanges without a fixed infrastructure MANETs are an appealing …
theme. By giving interchanges without a fixed infrastructure MANETs are an appealing …
Impact of features reduction on machine learning based intrusion detection systems
M Fatima, O Rehman… - EAI Endorsed Transactions …, 2022 - publications.eai.eu
INTRODUCTION: As the use of the internet is increasing rapidly, cyber-attacks over user's
personal data and network resources are on the rise. Due to the easily accessible cyber …
personal data and network resources are on the rise. Due to the easily accessible cyber …
Guest editorial: WWWJ special issue of the 21th international conference on web information systems engineering (WISE 2020)
The 21th International Conference on Web Information Systems Engineering (WISE 2020)
was held in Amsterdam, Netherlands, October 20–24, 2020. It was processed through online …
was held in Amsterdam, Netherlands, October 20–24, 2020. It was processed through online …
A Collaborative Programmable LFA Defense Using Temporal Graph Learning in AIoT
In the current era of rapid advancements in Artificial Intelligence of Things (AIoT), with the
increase in cloud data center operations and the limited security computing capabilities of …
increase in cloud data center operations and the limited security computing capabilities of …