4.2 Article

Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Intelligent ubiquitous computing for future UAV-enabled MEC network systems

Lunyuan Chen et al.

Summary: This paper investigates intelligent ubiquitous computing for future UAV-enabled MEC systems, optimizing system performance using reinforcement learning and transfer learning algorithms to reduce latency and energy consumption. Reinforcement learning is used to devise offloading strategy meeting constraints and alleviate effects of jamming attack, while transfer learning speeds up training process and enhances reinforcement learning performance. Simulation results show proposed offloading strategy outperforms conventional methods, and using transfer learning achieves better system performance with significantly reduced training time.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Telecommunications

Energy-Effective and Secure Data Transfer Scheme for Mobile Nodes in Smart City Applications

Mukesh Soni et al.

Summary: This paper addresses security issues in mobile node data transmission in smart cities and proposes a secure and efficient communication scheme to protect user identity privacy. Security evaluations are conducted to confirm the strengths of the proposed protocol against various attacks. Performance analysis and comparison with other relevant communication mechanisms are also discussed.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations

Sandeep Kumar Sood et al.

Summary: This paper introduces a fog-assisted cyber physical system to control panic attacks and COVID-19 infection risk in public places. By utilizing the concept of physical and cyber space, the model determines panic health and COVID-19 symptoms, predicts risks, and plans evacuation routes efficiently. The system provides timely and efficient evacuation prioritizing risk-affected areas, protecting people from panic attacks and COVID-19 infection.

COMPUTER COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Learning-Based Signal Detection for MIMO Systems With Unknown Noise Statistics

Ke He et al.

Summary: This paper proposes a novel ML detection framework that effectively approximates unknown noise distribution through normalizing flow to achieve robust signal detection and recovery in MIMO systems. Simulation results show its superiority in non-analytical noise environments over existing algorithms, while reaching the ML performance bound in analytical noise environments.

IEEE TRANSACTIONS ON COMMUNICATIONS (2021)

Proceedings Paper Computer Science, Information Systems

A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing

Muhammad Aminu Lawal et al.

Summary: This paper proposes a DDoS mitigation framework for IoT using fog computing to address security concerns and evaluates the framework's accuracy in detecting DDoS attacks.

LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G (2021)

Article Computer Science, Information Systems

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

Abdullah Ahmed Bahashwan et al.

Summary: The research proposes a flow-based approach to detect abnormal NDP traffic behavior for identifying RA and NS DoS flooding attacks. Experimental results show that the proposed approach performs well in terms of detection accuracy, precision, recall, and F1-Score, and outperforms other existing methods significantly.

IEEE ACCESS (2021)

Proceedings Paper Telecommunications

IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment

Chia-Wei Tseng et al.

APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS) (2020)

Article Computer Science, Artificial Intelligence

Emperor penguin optimizer: A bio-inspired algorithm for engineering problems

Gaurav Dhiman et al.

KNOWLEDGE-BASED SYSTEMS (2018)

Proceedings Paper Computer Science, Theory & Methods

An adaptive honeypot system to capture IPv6 address scans

Kazuya Kishimoto et al.

2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY) (2012)