A comprehensive survey on SDN and blockchain-based secure vehicular networks
IM Varma, N Kumar - Vehicular Communications, 2023 - Elsevier
Abstract Internet of Vehicles (IoV), as an emerging technology, has gained much attention in
recent years due to rapid advancements in computing paradigms, vehicular and wireless …
recent years due to rapid advancements in computing paradigms, vehicular and wireless …
Comparative analysis of control plane security of SDN and conventional networks
AR Abdou, PC Van Oorschot… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Software defined networking implements the network control plane in an external entity,
rather than in each individual device as in conventional networks. This architectural …
rather than in each individual device as in conventional networks. This architectural …
Characterizing the nature and dynamics of tor exit blocking
Facing abusive traffic from the Tor anonymity network, online service providers discriminate
against Tor users. In this study, we characterize not only the extent of such discrimination but …
against Tor users. In this study, we characterize not only the extent of such discrimination but …
Automatic detection of NoSQL injection using supervised learning
With the advancement in big data, NoSQL databases are enjoying ever-growing popularity.
The increasing use of this technology in large applications also brings security concerns to …
The increasing use of this technology in large applications also brings security concerns to …
Security analysis of unstructured data in NOSQL MongoDB database
NoSQL databases systems are non-relational databases uniquely intended to give high
accessibility, reliability, and scalability for enormous data. Additionally sharding is the main …
accessibility, reliability, and scalability for enormous data. Additionally sharding is the main …
A countermeasure to SQL injection attack for cloud environment
Although cloud computing becomes a new computing model, a variety of security threats
have been described. Among these threats, SQL injection attack (SQLIA) has received …
have been described. Among these threats, SQL injection attack (SQLIA) has received …
NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services
In the last years, NoSQL databases have grown in popularity due to their easy-to-deploy,
reliable, and scalable storage mechanism. While most NoSQL services offer access control …
reliable, and scalable storage mechanism. While most NoSQL services offer access control …
[PDF][PDF] NoSQL injection: data security on web vulnerability
W China - International Journal of Security and Its Applications, 2016 - academia.edu
Web sites can be dynamic and static sometimes a combination of both. To assure security all
the websites need protections to their database. This paper proposes a static analysis of …
the websites need protections to their database. This paper proposes a static analysis of …
NoSQL injection detection using supervised text classification
S Praveen, A Dcouth, AS Mahesh - 2022 2nd International …, 2022 - ieeexplore.ieee.org
For a long time, SQL injection has been considered one of the most serious security threats.
NoSQL databases are becoming increasingly popular as big data and cloud computing …
NoSQL databases are becoming increasingly popular as big data and cloud computing …
Security of NoSQL database against intruders
Background: The evolution of distributed web-based applications and cloud computing has
brought about the demand to store a large amount of big data in distributed databases. Such …
brought about the demand to store a large amount of big data in distributed databases. Such …