[HTML][HTML] A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges

PADSN Wijesekara, S Gunawardena - Network, 2023 - mdpi.com
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …

Exploring Blockchain-driven security in SDN-based IoT networks

N Indrason, G Saha - Journal of Network and Computer Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) is an emerging field of technology with a huge scope of
its applicability in various industries and a wide range of societal needs, including medical …

An intelligent blockchain-based secure link failure recovery framework for software-defined internet-of-things

J Ali, G Shan, N Gul, B Roh - Journal of Grid Computing, 2023 - Springer
The frequency of link failures in Internet-of-Things (IoT) network are more than the node
failures. Hence, effective link recovery schemes are required for a seamless communication …

Optimized artificial intelligence model for DDoS detection in SDN environment

Y Al-Dunainawi, BR Al-Kaseem… - IEEE Access, 2023 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks continue to be a major security concern,
threatening the availability and reliability of network services. Software-defined networking …

[HTML][HTML] Blockchain-assisted machine learning with hybrid metaheuristics-empowered cyber attack detection and classification model

A Albakri, B Alabdullah, F Alhayan - Sustainability, 2023 - mdpi.com
Cyber attack detection is the process of detecting and responding to malicious or
unauthorized activities in networks, computer systems, and digital environments. The …

Securing the digital supply chain cyber threats and vulnerabilities

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Measures for Logistics …, 2024 - igi-global.com
The digital supply chain has become an integral part of modern business operations,
enabling efficient and streamlined processes. However, with the rapid advancement of …

[HTML][HTML] Analyzing Miners' Dynamic Equilibrium in Blockchain Networks under DDoS Attacks

X Liu, Z Huang, Q Wang, X Jiang, Y Chen, B Wan - Electronics, 2023 - mdpi.com
Proof of work (PoW) is one of the most widely used consensus algorithms in blockchain
networks. It mainly uses the competition between mining nodes to obtain block rewards …

[HTML][HTML] Detection of HTTP DDoS Attacks Using NFStream and TensorFlow

M Chovanec, M Hasin, M Havrilla, E Chovancová - Applied Sciences, 2023 - mdpi.com
This paper focuses on the implementation of nfstream, an open source network data
analysis tool and machine learning model using the TensorFlow library for HTTP attack …

[HTML][HTML] A Repeated Game-Based Distributed Denial of Service Attacks Mitigation Method for Mining Pools

X Liu, Z Huang, Q Wang, Y Chen, Y Cao - Electronics, 2024 - mdpi.com
A Distributed Denial of Service (DDoS) attack is a prevalent issue in the blockchain network
layer, causing significant revenue loss for honest mining pools. This paper introduces a …

An explainable hybrid DNN model for seizure vs. Non-seizure classification and seizure localization using multi-dimensional EEG signals

G Amrani, A Adadi, M Berrada - Biomedical Signal Processing and Control, 2024 - Elsevier
Abstract Recent advancements in Deep Learning models hold the potential to revolutionize
the automated analysis of EEG data for early and accurate diagnosis of epileptic seizures …