A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet

J Ren, D Zhang, S He, Y Zhang, T Li - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …

[HTML][HTML] A blockchain future for internet of things security: a position paper

M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …

Toward an optimal solution against denial of service attacks in software defined networks

M Imran, MH Durad, FA Khan, A Derhab - Future Generation Computer …, 2019 - Elsevier
Abstract Software Defined Networking (SDN) separates the control logic from data
forwarding and shifts the whole decision power to the controller, making the switch a dumb …

A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning

NM Yungaicela-Naula, C Vargas-Rosales… - Journal of network and …, 2022 - Elsevier
Abstract Distributed Denial-of-Service (DDoS) attacks are difficult to mitigate with existing
defense tools. Fortunately, it has been demonstrated that Software-Defined Networking …

[HTML][HTML] A smart energy IoT model based on the Itsuku PoW technology

J Li, Y Chen, YL Chen, W Zhang, Z Liu - Results in Engineering, 2023 - Elsevier
Based on the blockchain+ software defined network (SDN) technology, we explore and
research a new smart energy networks IoT architecture model of distributed trust to solve the …

[HTML][HTML] Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art …

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …

Contract-based incentive mechanisms for honeypot defense in advanced metering infrastructure

W Tian, M Du, X Ji, G Liu, Y Dai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Honeypot defense deployment is considered as a promising technology to protect the
industrial Internet of Things (IIoT), especially Advanced Metering Infrastructure (AMI) …

Intelligent defense using pretense against targeted attacks in cloud platforms

RL Neupane, T Neely, P Calyam, N Chettri… - Future Generation …, 2019 - Elsevier
Cloud-hosted services are being increasingly used in online businesses in eg, retail,
healthcare, manufacturing, entertainment due to benefits such as scalability and reliability …

[HTML][HTML] Security policy scheme for an efficient security architecture in software-defined networking

W Lee, N Kim - Information, 2017 - mdpi.com
In order to build an efficient security architecture, previous studies have attempted to
understand complex system architectures and message flows to detect various attack …

FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks

A Albaseer, N Abdi, M Abdallah… - … on Network and …, 2024 - ieeexplore.ieee.org
Honeypot technologies provide an effective defense strategy for the Industrial Internet of
Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security …