A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …
driving cloud computing as a dominant computing paradigm. However, the dramatically …
[HTML][HTML] A blockchain future for internet of things security: a position paper
M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
Toward an optimal solution against denial of service attacks in software defined networks
Abstract Software Defined Networking (SDN) separates the control logic from data
forwarding and shifts the whole decision power to the controller, making the switch a dumb …
forwarding and shifts the whole decision power to the controller, making the switch a dumb …
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning
NM Yungaicela-Naula, C Vargas-Rosales… - Journal of network and …, 2022 - Elsevier
Abstract Distributed Denial-of-Service (DDoS) attacks are difficult to mitigate with existing
defense tools. Fortunately, it has been demonstrated that Software-Defined Networking …
defense tools. Fortunately, it has been demonstrated that Software-Defined Networking …
[HTML][HTML] A smart energy IoT model based on the Itsuku PoW technology
J Li, Y Chen, YL Chen, W Zhang, Z Liu - Results in Engineering, 2023 - Elsevier
Based on the blockchain+ software defined network (SDN) technology, we explore and
research a new smart energy networks IoT architecture model of distributed trust to solve the …
research a new smart energy networks IoT architecture model of distributed trust to solve the …
[HTML][HTML] Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art …
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …
Contract-based incentive mechanisms for honeypot defense in advanced metering infrastructure
Honeypot defense deployment is considered as a promising technology to protect the
industrial Internet of Things (IIoT), especially Advanced Metering Infrastructure (AMI) …
industrial Internet of Things (IIoT), especially Advanced Metering Infrastructure (AMI) …
Intelligent defense using pretense against targeted attacks in cloud platforms
RL Neupane, T Neely, P Calyam, N Chettri… - Future Generation …, 2019 - Elsevier
Cloud-hosted services are being increasingly used in online businesses in eg, retail,
healthcare, manufacturing, entertainment due to benefits such as scalability and reliability …
healthcare, manufacturing, entertainment due to benefits such as scalability and reliability …
[HTML][HTML] Security policy scheme for an efficient security architecture in software-defined networking
W Lee, N Kim - Information, 2017 - mdpi.com
In order to build an efficient security architecture, previous studies have attempted to
understand complex system architectures and message flows to detect various attack …
understand complex system architectures and message flows to detect various attack …
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks
A Albaseer, N Abdi, M Abdallah… - … on Network and …, 2024 - ieeexplore.ieee.org
Honeypot technologies provide an effective defense strategy for the Industrial Internet of
Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security …
Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security …