4.5 Article

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Security in IoT-enabled smart agriculture: architecture, security solutions and challenges

Anusha Vangala et al.

Summary: Agricultural industry, being a vital contributor to the economy, has witnessed significant changes in its operation with the advancement of precision farming and IoT. This paper explores the security scenarios in husbandry and proposes an architecture for smart farming. It conducts a literature survey on security protocols and authentication protocols in smart agriculture, as well as studies the current progress in IoT-based tools and systems.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Automation & Control Systems

Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things

Xingxia Dai et al.

Summary: This article investigates the application of mobile edge computing and device-to-device offloading in the industrial Internet of Things, proposing a co-offloading framework and a learning-based algorithm to address challenges such as mobility, selfishness, and incomplete information.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Theory & Methods

Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks

Yu Yao et al.

Summary: This study uses Distributed Kalman Filtering (DKF) and Deep Reinforcement Learning (DRL) techniques to improve anti-eavesdropping communication capacity and mitigate jamming interference in connected and autonomous vehicle networks. The researchers develop a DKF algorithm to more accurately track attackers by sharing state estimates among adjacent nodes. They also establish a design problem for controlling transmission power and selecting communication channels while ensuring the requirements of authorized vehicular users. A hierarchical Deep Q-Network (DQN)-based architecture is developed to design anti-eavesdropping power control and channel selection policies in uncertain and dynamic eavesdropping and jamming scenarios.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting

Zhenguang Liu et al.

Summary: This paper tackles the challenges of smart contracts from three aspects: generating function invocation sequences by considering data dependencies, using a branch distance-based measure to evolve test cases towards target branches, and employing a branch search algorithm to discover rare and vulnerable branches. The proposed IR-Fuzz method achieves higher branch coverage, detects more vulnerabilities, and is fast in generating test cases.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Security defense decision method based on potential differential game for complex networks

Hengwei Zhang et al.

Summary: This study integrates potential differential game theory with complex networks to propose a global optimal defense decision algorithm that considers the structural characteristics of complex networks and the attack-defense characteristics of cybersecurity. A network attack-defense potential differential game model is constructed based on the evolutionary analysis of network security states. Adversarial analysis is carried out on the overall attack-defense strategy, and a defense decision algorithm is designed based on a saddle point equilibrium strategy. Simulation tests are conducted to evaluate the effectiveness of the proposed method.

COMPUTERS & SECURITY (2023)

Article Computer Science, Information Systems

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis

Wei Zheng et al.

Summary: This paper studies a static fuzzy mutation method for program code, which can improve the efficiency of mutation sample generation according to the vulnerability evolution law, thus promoting the development of zero-day vulnerability detection methods based on deep learning techniques.

INFORMATION AND SOFTWARE TECHNOLOGY (2023)

Review Computer Science, Artificial Intelligence

The multi-modal fusion in visual question answering: a review of attention mechanisms

Siyu Lu et al.

Summary: Visual Question Answering (VQA) is a significant cross-disciplinary issue that requires a computer to output a natural language answer based on pictures and questions. The attention mechanism plays a key role in integrating text features and visual features. This article explores the development status of attention mechanisms, analyzes existing methods, and discusses the future direction of VQA.

PEERJ COMPUTER SCIENCE (2023)

Article Computer Science, Theory & Methods

Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach

Yujia Song et al.

Summary: This paper proposes a deep learning-based anomaly detection method for multivariate time series in real-world operational clouds. The method utilizes two parallel graph neural networks (GNN) to learn the time and feature inter-dependencies, resulting in fewer false positives. The evaluation shows that the proposed method outperforms seven baseline methods with an average F1-Score of 0.871, improving by 19.9% compared to state-of-the-art methods. Additionally, the method correctly identifies the root cause of detected anomalies with up to 74.1% accuracy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Humanities, Multidisciplinary

Emotion classification for short texts: an improved multi-label method

Xuan Liu et al.

Summary: The computational identification and categorization of opinions in text is crucial for providing better understanding and services to online users. However, the current multi-label automatic classification is still inadequate. This study proposes a modified MLkNN classifier that considers both in-sentence and adjacent sentence features, resulting in improved accuracy and speed in emotion classification for short texts on Twitter.

HUMANITIES & SOCIAL SCIENCES COMMUNICATIONS (2023)

Article Social Sciences, Interdisciplinary

Developing Multi-Labelled Corpus of Twitter Short Texts: A Semi-Automatic Method

Xuan Liu et al.

Summary: Facing the growing need to extract textual features of online texts for better communication in the Digital Media Age, sentiment classification, by developing corpora with annotation of emotions, is considered the key method to catch emotions of online communication. However, the manual annotation process is labor-intensive and costly, resulting in the lack of corpora for emotional words. Therefore, there is an urgent need for improvement in the methods of automatic emotion tagging with multiple emotion labels to construct new semantic corpora.

SYSTEMS (2023)

Article Engineering, Electrical & Electronic

SDN-Based Federated Learning Approach for Satellite-IoT Framework to Enhance Data Security and Privacy in Space Communication

Ryhan Uddin et al.

Summary: The integration of IoT devices and machine learning technologies has led to automation in various sectors guided by AI. In the context of space exploration, AI-powered IoT networks will play a crucial role in self-governing systems in space colonies. However, ensuring data protection is essential for widespread adoption. This paper proposes a federated learning based approach to address data breach in the satellite-IoT framework and implements an SDN backbone with a traffic regulator for network security. The system achieves a promising accuracy rate of 79.47% in detecting attacks.

IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION (2023)

Article Computer Science, Information Systems

Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing

Wei Jiang et al.

Summary: Computation offloading via device-to-device communications improves the performance of mobile edge computing. Existing optimization-based schemes lack self-adaptive abilities in dynamic environments. The proposed hierarchical deep reinforcement learning (HDRL) framework solves the joint computation offloading and resource allocation problem by combining deep Q-network (DQN) and deep deterministic policy gradient (DDPG) methods. Simulation results demonstrate the effectiveness of the HDRL algorithm in reducing task computation latency.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Artificial Intelligence

Practical and Robust Federated Learning With Highly Scalable Regression Training

Song Han et al.

Summary: Privacy-preserving federated learning is a promising approach for IoT in healthcare, and this article proposes two practical noninteractive federated learning schemes, HE-NFRT and Mask-NFRT, which can protect the privacy of data owners' training data, resist collusion attacks, and support strong verification.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Cybernetics

A Privacy-Aware and Incremental Defense Method Against GAN-Based Poisoning Attack

Feifei Qiao et al.

Summary: Federated learning is used in financial risk management for fraud detection to improve model accuracy without exchanging training data. Existing defenses for GAN-based poisoning attacks have limitations, and to address these, we propose a privacy-aware and incremental defense (PID) method to detect malicious participants and protect privacy.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Review Chemistry, Analytical

A Survey of Security in Cloud, Edge, and Fog Computing

Aleksandr Ometov et al.

Summary: This literature review examines the research interest in information security and privacy and the development of computing paradigms, and addresses the security and privacy challenges arising from their heterogeneity. The study identifies essential security and privacy threats in these paradigms and highlights the deployment techniques used to mitigate and enhance security and privacy shortcomings.

SENSORS (2022)

Article Computer Science, Information Systems

Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey

Shivani Singh et al.

Summary: Edge computing is a technological advancement that connects sensors and provides services at the device end, but security is a major concern. This article explores the security and privacy issues in different layers of the Edge computing architecture and the machine learning algorithms used to address these concerns. It also discusses various types of attacks on the Edge network and introduces intrusion detection systems and machine learning algorithms that overcome these security and privacy challenges.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Resource Orchestration of Cloud-Edge-based Smart Grid Fault Detection

Jie Li et al.

Summary: This study investigates a cloud-edge based hybrid smart grid fault detection system using embedded devices and lightweight neural networks. By optimizing communication and computational resource allocation, the processing throughput and resource utilization of the system are improved.

ACM TRANSACTIONS ON SENSOR NETWORKS (2022)

Article Computer Science, Information Systems

Machine learning-based early detection of IoT botnets using network-edge traffic

Ayush Kumar et al.

Summary: In this work, a solution called EDIMA is presented for IoT botnet detection. It consists of lightweight modules deployed at edge gateways in home networks, with additional modules implemented on cloud servers. EDIMA aims to detect IoT botnets prior to an attack, featuring a novel two-stage Machine Learning-based detector. The solution achieves high accuracies in bot scanning and bot-CnC traffic detection, with low false positive rates, and is shown to be robust to increasing IoT device connections. Performance analysis demonstrates low bot detection delays and RAM consumption. EDIMA outperforms existing detection techniques for bot scanning traffic and bot-CnC server communication.

COMPUTERS & SECURITY (2022)

Article Chemistry, Analytical

Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review

Mamoona Majid et al.

Summary: This article introduces the fourth industrial revolution (Industry 4.0) and its applications in the fields of Internet of Things (IoT) and wireless sensor networks (WSN), discusses the various issues and future directions in this area, and provides a systematic literature review of relevant research in recent years.

SENSORS (2022)

Article Computer Science, Information Systems

Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices

Segun Popoola et al.

Summary: This article proposes a federated deep learning method for zero-day botnet attack detection in IoT-edge devices. The method generates a global model by coordinating the training of independent models in multiple IoT-edge devices, achieving high-performance classification detection of zero-day botnet attacks and ensuring data privacy and security.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Uniting cyber security and machine learning: Advantages, challenges and future research

Mohammad Wazid et al.

Summary: The combination of machine learning and cyber security can enhance model security, improve performance, and enable effective detection of zero day attacks. This paper discusses the integration of these two concepts, as well as the advantages, issues, challenges, and future research directions.

ICT EXPRESS (2022)

Article Computer Science, Information Systems

Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey

Jaskaran Singh et al.

Summary: Cyber physical systems integrate sensing, computation, control, and networking processes into physical objects and infrastructure. The tight coupling of cyber systems with physical systems introduces challenges in stability, security, efficiency, and reliability. Machine learning security aims to protect machine learning models against various cyber attacks. In this article, various machine learning security attacks in cyber physical systems are discussed, along with defense mechanisms and a comparative study of ML models' performance under the influence of these attacks.

COMPUTER COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission

Kunrui Cao et al.

Summary: This paper investigates the security of semi-grant-free NOMA transmission in the presence of passive and active eavesdropping attacks. Different scheduling schemes are proposed to combat eavesdropping attacks for different user scenarios. The system performance is evaluated by analyzing the secrecy outage probability. Simulation results validate the superiority of the proposed schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach

Bin Li et al.

Summary: This article investigates a dynamic event-triggered security control problem in networked control systems under deception attacks and packet dropouts. A combined cyberattack model is proposed to reflect randomly occurring cyber-attacks. A dynamic event-triggered protocol is constructed to reduce data transmission and relieve bandwidth pressure. An online model predictive control algorithm is established to ensure stochastic stability and expected performance. Two examples are simulated to verify the effectiveness of the proposed design strategy.

INFORMATION SCIENCES (2022)

Article Business

ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments

Rana Faisal Hayat et al.

Summary: Distributed denial of service (DDoS) attacks and botnet-based attacks are critical security vulnerabilities in IoT environments. This article proposes a multilevel DDoS mitigation approach using blockchain technology to protect IoT devices. The proposed framework achieves significant improvements in throughput, latency, and CPU utilization compared to existing methods.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)

Article Computer Science, Information Systems

Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions

Anastasios N. Bikos et al.

Summary: With the rapid proliferation of IoT devices and sensors, the security implications for these devices are becoming more concerning. Blockchain technology, particularly the DAG-based implementation like IOTA, is seen as a promising solution to ensure the security of IoT devices and data. This paper provides a thorough analysis of existing security studies for IOTA and proposes future research recommendations to address the gaps and limitations in current security schemes.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

A Distributed SDN Controller for Distributed IoT

Ramin Firouzi et al.

Summary: Over the past decade, the Internet of Things (IoT) has shifted towards edge computing. Existing paradigms lack the use of edge devices for decision making, while distributed intelligence can strengthen IoT. To provide dynamic and efficient IoT services, integrating transport network control with distributed edge and cloud resources is necessary. A distributed SDN-based architecture is proposed, deploying Federated Learning Applications on the gateways to provide distributed intelligence at the edge.

IEEE ACCESS (2022)

Article Computer Science, Hardware & Architecture

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN

Dan Tang et al.

Summary: LDoS attacks reduce network performance by sending short-term high-pulse packets, making it indistinguishable from normal traffic. The proposed method in this paper, based on multi-feature fusion and CNN, effectively detects LDoS attacks.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Computer Science, Information Systems

Edge computing based surveillance framework for real time activity recognition

D. Aishwarya et al.

Summary: Closed Circuit Television (CCTV) based Surveillance is now a fundamental part of security systems, with the emergence of Edge Computing bringing hope for real time crime prevention. The proposed architecture employs a Convolutional Neural Network (CNN) to classify different actions and locate identified activities in image frames, proving to be efficient when tested against a dataset from SRM IST campus.

ICT EXPRESS (2021)

Article Computer Science, Artificial Intelligence

Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm

Rajesh Kumar Dhanaraj et al.

Summary: The study introduces a method based on EGSA-SABD to detect and isolate BH attackers in WSNs by clustering sensor nodes and evaluating the possibility of BH attacks in deployed nodes. With this approach, the BH attack detection probability rate is significantly improved, and energy consumption is reduced significantly.

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Information Systems

Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm

Yasser Alharbi et al.

Summary: By utilizing the lightweight KNN optimization algorithm and information gain rate, this study aims to enhance the performance of DoS intrusion detection in IPv6 network environment through feature dimensionality reduction and distance optimization.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Construction & Building Technology

Security issues in implantable medical devices: Fact or fiction?

Vikas Hassija et al.

Summary: Smart healthcare is becoming more integrated with software, allowing control and monitoring of medical devices. However, this connectivity also poses security threats that need to be addressed.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Computer Science, Information Systems

Hierarchical Security Paradigm for IoT Multiaccess Edge Computing

Jaspreet Singh et al.

Summary: The increase in usage of embedded and IoT devices has led to a rise in LTE usage. Edge computing and multiaccess edge computing have been introduced to address challenges such as security and latency, while the proposed software-defined perimeter framework provides additional security protection.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms

Anil Kumar Rangisetti et al.

Summary: NFV and SDN technologies support the deployment of data centers in Cloud-Fog-Edge platforms. However, multi-tenant sharing platforms may lead to security issues for customer applications.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack

Dan Tang et al.

Summary: The LDoS attack exploits vulnerabilities in network protocols and application services, with attack traffic closely resembling normal traffic, making it difficult to detect using traditional methods. This study proposes a novel fractal residual based real-time detection method, FR-RED, which shows high accuracy in estimating the beginning and end of the LDoS attack in real-time.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Article Telecommunications

A survey on the blockchain techniques for the Internet of Vehicles security

Sathish Kumar et al.

Summary: The concept of Internet of Vehicles (IoV) involves sharing data between vehicles and infrastructure, which is important for enhancing vehicular services but also makes IoV vulnerable to security and privacy issues. Blockchain technology has been increasingly used to address security concerns in IoV due to its robust design.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

FraudTrip: Taxi Fraudulent Trip Detection From Corresponding Trajectories

Ye Ding et al.

Summary: The article introduces a system called FraudTrip, which effectively and efficiently detects unmetered taxi trips, solving the problem that existing detection methods cannot be applied to real-world scenarios.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Security aspects of Internet of Things aided smart grids: A bibliometric survey

Sakhnini Jacob et al.

Summary: The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology. One critical issue facing the smart grid is its increased vulnerability to cyber-threats. This paper presents a bibliometric survey of research papers focused on the security aspects of Internet of Things (IoT) aided smart grids, and offers insights into the types of cyber-threats, security mechanisms, and research gaps in this field.

INTERNET OF THINGS (2021)

Review Computer Science, Information Systems

5G Security Challenges and Solutions: A Review by OSI Layers

S. Sullivan et al.

Summary: 5G envisions a broader range of services but also brings about increased hacker activity, necessitating strong security measures. This paper provides an objective overview of 5G security issues, focusing on vulnerabilities, challenges, and research problems in each OSI layer.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

Kunrui Cao et al.

Summary: This study investigates the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with energy harvesting jammers. Three different friendly EH jammer selection schemes are proposed to enhance system secrecy performance. Analytical and numerical results show that these schemes can achieve better secrecy performance than conventional schemes without EH jammers, with different levels of secrecy diversity orders and convergence to the same effective secrecy throughput floor.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

Distributed denial of service attacks and its defenses in IoT: a survey

Mikail Mohammed Salim et al.

JOURNAL OF SUPERCOMPUTING (2020)

Article Telecommunications

An Intrusion Detection System on Ping of Death Attacks in IoT Networks

Asrin Abdollahi et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Learning-Based Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT

Haijun Liao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks

Yizhen Jia et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things

Jiabin Li et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing

Hokeun Kim et al.

ACM TRANSACTIONS ON INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey

Wu Zhijun et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

An Active Defense Solution for ARP Spoofing in OpenFlow Network

Xia Jing et al.

CHINESE JOURNAL OF ELECTRONICS (2019)

Article Automation & Control Systems

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

A fog computing based approach to DDoS mitigation in IIoT systems

Luying Zhou et al.

COMPUTERS & SECURITY (2019)

Article Engineering, Electrical & Electronic

Edge Computing Security: State of the Art and Challenges

Yinhao Xiao et al.

PROCEEDINGS OF THE IEEE (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Botnet Attack Detection at the IoT Edge Based on Sparse Representation

Christos Tzagkarakis et al.

2019 GLOBAL IOT SUMMIT (GIOTS) (2019)

Proceedings Paper Computer Science, Information Systems

FedDANE: A Federated Newton-Type Method

Tian Li et al.

CONFERENCE RECORD OF THE 2019 FIFTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (2019)

Article Chemistry, Analytical

A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks

Opeyemi Osanaiye et al.

SENSORS (2018)

Article Computer Science, Information Systems

A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework

Da Yin et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture For Edge Computing

Pradip Kumar Sharma et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

Yair Meidan et al.

IEEE PERVASIVE COMPUTING (2018)

Article Computer Science, Information Systems

Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network

Qaisar Shafi et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Situation-Aware IoT Service Coordination Using the Event-Driven SOA Paradigm

Bo Cheng et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Information Systems

Situation-Aware IoT Service Coordination Using the Event-Driven SOA Paradigm

Bo Cheng et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Mathematics, Applied

Asymptotic dynamics of the one-dimensional attraction-repulsion Keller-Segel model

Hai-Yang Jin et al.

MATHEMATICAL METHODS IN THE APPLIED SCIENCES (2015)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Theory & Methods

Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security

Yupeng Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Computer Science, Information Systems

Multivariate Fuzzy Analysis for Mobile Ad hoc Network Threat Detection

Sathish Kumar Alampalayam et al.

INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2008)

Article Telecommunications

An adaptive and predictive security model for mobile ad hoc networks

S Alampalayam et al.

WIRELESS PERSONAL COMMUNICATIONS (2004)