66   Artículos

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar    
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Amthal K. Mousa and Mohammed Najm Abdullah    
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu    
Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer?s experience and requires considerable work. In this paper, a GA (genetic algorithm) is used to ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qiwen Tian and Sumiko Miyata    
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a cer... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer    
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Interne... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho    
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks p... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »