Context-aware security for 6G wireless: The role of physical layer security
Sixth generation systems are expected to face new security challenges, while opening up
new frontiers toward context awareness in the wireless edge. The workhorse behind this …
new frontiers toward context awareness in the wireless edge. The workhorse behind this …
[HTML][HTML] A Comprehensive Survey on DDoS Attacks Detection & Mitigation in SDN-IoT Network
C Singh, AK Jain - e-Prime-Advances in Electrical Engineering …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed our lives by introducing new services
and enhancing productivity. However, the widespread adoption of IoT devices and …
and enhancing productivity. However, the widespread adoption of IoT devices and …
Challenges in sensors technology for industry 4.0 for futuristic metrological applications
The current advances and innovations in sensor technologies attributed to Industry 4.0 serve
as the backbone for the inclusive growth of industry and ramping up the economy of any …
as the backbone for the inclusive growth of industry and ramping up the economy of any …
A pragmatical approach to anomaly detection evaluation in edge cloud systems
Anomaly detection (AD) has been recently employed in the context of edge cloud
computing, eg, for intrusion detection and identification of performance issues. However …
computing, eg, for intrusion detection and identification of performance issues. However …
Centralized and distributed intrusion detection for resource-constrained wireless SDN networks
Software-defined networking (SDN) was devised to simplify network management and
automate infrastructure sharing in wired networks. These benefits motivated the application …
automate infrastructure sharing in wired networks. These benefits motivated the application …
EIDDM: Edge and internet layer distributed dos threats detection and mitigation for internet of things wireless communications
Abstract Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-
enabled distributed communication network. To mitigate DDoS attacks on IoT many …
enabled distributed communication network. To mitigate DDoS attacks on IoT many …
How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
Network-aware AutoML framework for software-defined sensor networks
As the current detection solutions of distributed denial of service attacks (DDoS) need
additional infrastructures to handle high aggregate data rates, they are not suitable for …
additional infrastructures to handle high aggregate data rates, they are not suitable for …
Centralized energy prediction in wireless sensor networks leveraged by software-defined networking
GA Nunez Segura, C Borges Margi - Energies, 2021 - mdpi.com
Resource Constraints in Wireless Sensor Networks are a key factor in protocols and
application design. Furthermore, energy consumption plays an important role in protocols …
application design. Furthermore, energy consumption plays an important role in protocols …
BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network
The rapid adoption of IPv6 has increased network access scale while also escalating the
threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is …
threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is …