Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools

T Mahmood, U Afzal - 2013 2nd national conference on …, 2013 - ieeexplore.ieee.org
The rapid growth of the Internet has brought with it an exponential increase in the type and
frequency of cyber attacks. Many well-known cybersecurity solutions are in place to …

DoS and DDoS vulnerability of IoT: a review

E Džaferović, A Sokol, A Abd Almisreb… - Sustainable …, 2019 - sei.ardascience.com
Abstract Internet of Things (IoT) paradigm became particularly popular in the last couple of
years in such a way that the devices are present in almost every home across the globe …

Defence against black hole and selective forwarding attacks for medical WSNs in the IoT

A Mathur, T Newe, M Rao - Sensors, 2016 - mdpi.com
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in
hospital and home environments. These systems consist of a variety of different …

Cyber security threats, challenges and defence mechanisms in cloud computing

A Aljumah, TA Ahanger - IET communications, 2020 - Wiley Online Library
With the advent of computers and their widespread use, cloud computing has been
identified as one of the major emerging components of computer technology. The benefits of …

A secure end-to-end IoT solution

A Mathur, T Newe, W Elgenaidi, M Rao, G Dooly… - Sensors and Actuators A …, 2017 - Elsevier
Abstract The Internet of Things (IoT) has been expanding in recent years with advancements
in technologies, techniques and devices. This expansion has led to several different …

Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks

TV Phan, NK Bao, M Park - Journal of Network and Computer Applications, 2017 - Elsevier
Abstract Software-Defined Networking (SDN) is a new programmable networking model that
features the detachment of control and data planes. In this network, the network brain is an …

Adaptive neuro‐fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs

V Thiruppathy Kesavan, S Murugavalli… - IET …, 2023 - Wiley Online Library
Abstract Vehicular Adhoc Networks (VANET) facilitate inter‐vehicle communication using
their dedicated connection infrastructure. Numerous advantages and applications exist …

NFT-Based Data Marketplace with Digital Watermarking

S Ranjbar Alvar, M Akbari, D Yue, Y Zhang - Proceedings of the 29th …, 2023 - dl.acm.org
In today's digital world, enterprises and individuals are generating massive data that is
potentially useful for many data consumers with data driven applications. The emergence of …

Detecting attacks in high-speed networks: Issues and solutions

A Gupta, LS Sharma - Information Security Journal: A Global …, 2020 - Taylor & Francis
Intrusion detection systems are one of the necessities of networks to identify the problem of
network attacks. Organizations striving to protect their data from intruders are often …

Designing and modeling the slow next DoS attack

E Cambiaso, G Papaleo, G Chiola, M Aiello - … Joint Conference: CISIS'15 …, 2015 - Springer
In the last years the Internet has become a primary tool for information dissemination,
spreading itself on the entire world and becoming a necessary communication system. More …