An Overview of Integration of the Virtualization of Network Functions in the Context of Information Centric Networks

AC Castillo - 2023 3rd International Conference on Electrical …, 2023 - ieeexplore.ieee.org
Nowadays, the new network architectures with respect to the traditional network topologies
must manage more data, which entails having increasingly robust and scalable network …

An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review

MA Alsoufi, MM Siraj, FA Ghaleb… - … Conference of Reliable …, 2023 - Springer
Devices connected to the Internet of Things are expanding quickly and producing tons of
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …

To evaluate and analyze the performance of anomaly detection in cloud of things

U Garg, H Sivaraman, A Bamola… - 2022 13th International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a household name in our day-to-day life. The IoT
concept offers several opportunities to improve human life as well as save the time, but it …

Field Size-based Packet Header Anomaly Detection with Rule-Based Normal Profile Updating for Intrusion Detection

V Prasad, MK KG - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Packet Header Anomaly Detection, or PHAD, is a technique for detecting network intrusion.
It assigns scores to a packet using some method and uses these scores to predict whether …

Intrusion Detection Using Statistical Classifier Based on Packet Header Analysis

V Prasad, B Malarkodi, MK KG, SK Dhruw - 2024 - researchsquare.com
From a network perspective, any attack that can prevent a network or system from
performing its tasks can be considered an intrusion. Network intrusions pose a significant …

Review on network function virtualization in information-centric networking

Y Fazea, F Mohammed, M Madi… - … of technology, science …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV/VNF) and information-centric networking (ICN) are two
trending technologies that have attracted expert's attention. NFV is a technique in which …

Check for updates

MA Alsoufil, MM Siraj¹, FA Ghaleb¹… - Advances in Intelligent … - books.google.com
Devices connected to the Internet of Things are expanding quickly and producing tons of
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …