An Overview of Integration of the Virtualization of Network Functions in the Context of Information Centric Networks
AC Castillo - 2023 3rd International Conference on Electrical …, 2023 - ieeexplore.ieee.org
Nowadays, the new network architectures with respect to the traditional network topologies
must manage more data, which entails having increasingly robust and scalable network …
must manage more data, which entails having increasingly robust and scalable network …
An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review
Devices connected to the Internet of Things are expanding quickly and producing tons of
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …
To evaluate and analyze the performance of anomaly detection in cloud of things
U Garg, H Sivaraman, A Bamola… - 2022 13th International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a household name in our day-to-day life. The IoT
concept offers several opportunities to improve human life as well as save the time, but it …
concept offers several opportunities to improve human life as well as save the time, but it …
Field Size-based Packet Header Anomaly Detection with Rule-Based Normal Profile Updating for Intrusion Detection
V Prasad, MK KG - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Packet Header Anomaly Detection, or PHAD, is a technique for detecting network intrusion.
It assigns scores to a packet using some method and uses these scores to predict whether …
It assigns scores to a packet using some method and uses these scores to predict whether …
Intrusion Detection Using Statistical Classifier Based on Packet Header Analysis
V Prasad, B Malarkodi, MK KG, SK Dhruw - 2024 - researchsquare.com
From a network perspective, any attack that can prevent a network or system from
performing its tasks can be considered an intrusion. Network intrusions pose a significant …
performing its tasks can be considered an intrusion. Network intrusions pose a significant …
Review on network function virtualization in information-centric networking
Network function virtualization (NFV/VNF) and information-centric networking (ICN) are two
trending technologies that have attracted expert's attention. NFV is a technique in which …
trending technologies that have attracted expert's attention. NFV is a technique in which …
Check for updates
MA Alsoufil, MM Siraj¹, FA Ghaleb¹… - Advances in Intelligent … - books.google.com
Devices connected to the Internet of Things are expanding quickly and producing tons of
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …
data. Simultaneously, malicious attempts to gain access to sensitive data or disrupt networks …