A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
Future intelligent and secure vehicular network toward 6G: Machine-learning approaches
As a powerful tool, the vehicular network has been built to connect human communication
and transportation around the world for many years to come. However, with the rapid growth …
and transportation around the world for many years to come. However, with the rapid growth …
A survey on attack detection, estimation and control of industrial cyber–physical systems
D Zhang, QG Wang, G Feng, Y Shi, AV Vasilakos - ISA transactions, 2021 - Elsevier
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Cyber security in the smart grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey
Internet of Things (IoT) devices are widely used in many industries including smart cities,
smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service …
smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service …
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
BB Gupta, OP Badve - Neural Computing and Applications, 2017 - Springer
As Cloud computing is reforming the infrastructure of IT industries, it has become one of the
critical security concerns of the defensive mechanisms applied to secure Cloud …
critical security concerns of the defensive mechanisms applied to secure Cloud …
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
Machine learning based DDoS attack detection from source side in cloud
Denial of service (DOS) attacks are a serious threat to network security. These attacks are
often sourced from virtual machines in the cloud, rather than from the attacker's own …
often sourced from virtual machines in the cloud, rather than from the attacker's own …