Cloud resource allocation schemes: review, taxonomy, and opportunities

A Yousafzai, A Gani, RM Noor, M Sookhak… - … and information systems, 2017 - Springer
Cloud computing has emerged as a popular computing model to process data and execute
computationally intensive applications in a pay-as-you-go manner. Due to the ever …

[HTML][HTML] A dynamic MLP-based DDoS attack detection method using feature selection and feedback

M Wang, Y Lu, J Qin - Computers & Security, 2020 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is a stubborn network security problem.
Various machine learning-based methods have been proposed to detect such attacks …

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects

A Srivastava, S Gupta, M Quamara… - International Journal …, 2020 - Wiley Online Library
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards
has fascinated noteworthy consideration from numerous research communities. In this view …

Multi‐objective‐based feature selection for DDoS attack detection in IoT networks

M Roopak, GY Tian, J Chambers - IET Networks, 2020 - Wiley Online Library
In this study, the authors propose a multi‐objective optimisation‐based feature selection
(FS) method for the detection of distributed denial of service (DDoS) attacks in an internet of …

Decentralized access control for IoT data using blockchain and trusted oracles

H Al Breiki, L Al Qassem, K Salah… - … on Industrial Internet …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of connected electromechanical devices that have
limited computational, networking, and storage capabilities. IoT is now widely used in …

Modeling and analyzing cascading failures for Internet of Things

X Fu, Y Yang - Information Sciences, 2021 - Elsevier
Network survivability is one of the key challenges that the Internet of Things (IoTs) has to
deal with, and cascading failures are one of the main bottlenecks affecting the network …

An effective mechanism to mitigate real-time DDoS attack

R Abubakar, A Aldegheishem, MF Majeed… - IEEE …, 2020 - ieeexplore.ieee.org
Computer networks are subject to an unprecedented number and variety of attack, the
majority of which are distributed denial of service (DDoS). The nature and mechanisms …

Task partitioning scheduling algorithms for heterogeneous multi-cloud environment

SK Panda, SK Pande, S Das - Arabian Journal for Science and …, 2018 - Springer
Cloud computing is now an emerging trend for cost-effective, universal access, reliability,
availability, recovery and flexible IT resources. Although cloud computing has a tremendous …

A unified framework for cloud security transparency and audit

UM Ismail, S Islam - Journal of information security and applications, 2020 - Elsevier
The paradigm of cloud computing has elevated IT to new heights by offering the elasticity to
match customer needs, while also reducing capital expenditure on procuring IT …

Multi attribute auction based incentivized solution against DDoS attacks

A Dahiya, BB Gupta - Computers & Security, 2020 - Elsevier
Complexity and severity of DDoS attacks is increasing day by day. Internet has highly
inconsistent structure in terms of resource distribution. Numerous technical solutions are …