Found: 59
Select item for more details and to access through your institution.
RPL-based attack detection approaches in IoT networks: review and taxonomy.
- Published in:
- Artificial Intelligence Review, 2024, v. 57, n. 9, p. 1, doi. 10.1007/s10462-024-10907-y
- By:
- Publication type:
- Article
Feature Selection and 1DCNN-based DDOS Detection in Software-Defined Networking.
- Published in:
- Engineering Letters, 2024, v. 32, n. 7, p. 1529
- By:
- Publication type:
- Article
Secure map-based crypto-stego technique based on mac address.
- Published in:
- Bulletin of Electrical Engineering & Informatics, 2024, v. 13, n. 3, p. 1788, doi. 10.11591/eei.v13i3.7140
- By:
- Publication type:
- Article
Neighbor discovery protocol anomaly-based detection system using neural network algorithm.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1787, doi. 10.1007/s10207-024-00815-1
- By:
- Publication type:
- Article
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00169-0
- By:
- Publication type:
- Article
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN.
- Published in:
- PLoS ONE, 2024, v. 19, n. 2, p. 1, doi. 10.1371/journal.pone.0297548
- By:
- Publication type:
- Article
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 1, p. 491, doi. 10.32604/cmc.2023.041108
- By:
- Publication type:
- Article
Machine and deep learning techniques for detecting internet protocol version six attacks: a review.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 5, p. 5617, doi. 10.11591/ijece.v13i5.pp5617-5631
- By:
- Publication type:
- Article
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 19, p. 8191, doi. 10.3390/s23198191
- By:
- Publication type:
- Article
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7342, doi. 10.3390/s23177342
- By:
- Publication type:
- Article
Enhancing Cloud Computing Analysis: A CCE-Based HTTP-GET Log Dataset.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 16, p. 9086, doi. 10.3390/app13169086
- By:
- Publication type:
- Article
Adaptive 3D Reversible Data Hiding Technique Based on the Cumulative Peak Bins in the Histogram of Directional Prediction Error.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 15, p. 3245, doi. 10.3390/electronics12153245
- By:
- Publication type:
- Article
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 14, p. 6507, doi. 10.3390/s23146507
- By:
- Publication type:
- Article
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5644, doi. 10.3390/s23125644
- By:
- Publication type:
- Article
Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller.
- Published in:
- Systems, 2023, v. 11, n. 6, p. 296, doi. 10.3390/systems11060296
- By:
- Publication type:
- Article
An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 2641, doi. 10.32604/cmc.2023.035793
- By:
- Publication type:
- Article
Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 3375, doi. 10.32604/cmc.2023.036587
- By:
- Publication type:
- Article
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 9, p. 4441, doi. 10.3390/s23094441
- By:
- Publication type:
- Article
Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 7, p. 3736, doi. 10.3390/s23073736
- By:
- Publication type:
- Article
Geochemistry and Petrogenesis of the Ediacaran Post-Collisional Granitoid Rocks in the Midyan Terrain, Northern Arabian Shield, Saudi Arabia.
- Published in:
- Minerals (2075-163X), 2023, v. 13, n. 3, p. 379, doi. 10.3390/min13030379
- By:
- Publication type:
- Article
Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 2, p. 775, doi. 10.3390/app13020775
- By:
- Publication type:
- Article
Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 23, p. 12441, doi. 10.3390/app122312441
- By:
- Publication type:
- Article
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 12, p. 2483, doi. 10.3390/sym14122483
- By:
- Publication type:
- Article
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 12, p. 2556, doi. 10.3390/sym14122556
- By:
- Publication type:
- Article
Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 1, p. 1403, doi. 10.32604/cmc.2022.029369
- By:
- Publication type:
- Article
Performance evaluation of route optimization management of producer mobility in information-centric networking.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 5, p. 5260, doi. 10.11591/ijece.v12i5.pp5260-5271
- By:
- Publication type:
- Article
IDENTIFYING OPTIMAL MESSAGE EMBEDDING LOCATION IN AUDIO STEGANOGRAPHY USING GENERATIVE ADVERSARIAL NETWORKS.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2022, v. 118, n. 9, p. 59, doi. 10.15587/1729-4061.2022.263695
- By:
- Publication type:
- Article
Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 12, p. 6127, doi. 10.3390/app12126127
- By:
- Publication type:
- Article
Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 12, p. 6150, doi. 10.3390/app12126150
- By:
- Publication type:
- Article
Integrated Approach to Achieve a Sustainable Organic Waste Management System in Saudi Arabia.
- Published in:
- Foods, 2022, v. 11, n. 9, p. 1214, doi. 10.3390/foods11091214
- By:
- Publication type:
- Article
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 9, p. 3400, doi. 10.3390/s22093400
- By:
- Publication type:
- Article
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 5, p. N.PAG, doi. 10.3390/s22051696
- By:
- Publication type:
- Article
Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2022, v. 2022, n. 1, p. 1, doi. 10.1186/s13638-022-02091-w
- By:
- Publication type:
- Article
Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 3, p. 1383, doi. 10.3390/app12031383
- By:
- Publication type:
- Article
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 40, n. 1, p. 87, doi. 10.32604/csse.2022.017941
- By:
- Publication type:
- Article
Subjective versus objective recognition of facial vitiligo lesions: detection of subclinical lesions by Wood's light.
- Published in:
- Journal of the Egyptian Women's Dermatologic Society, 2022, v. 19, n. 1, p. 7, doi. 10.4103/jewd.jewd_42_21
- By:
- Publication type:
- Article
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 24, p. 8206, doi. 10.3390/s21248206
- By:
- Publication type:
- Article
Cloud Data Center Selection Using a Modified Differential Evolution.
- Published in:
- Computers, Materials & Continua, 2021, v. 69, n. 3, p. 3179, doi. 10.32604/cmc.2021.018546
- By:
- Publication type:
- Article
COVID-19 Automatic Detection Using Deep Learning.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 39, n. 1, p. 15, doi. 10.32604/csse.2021.017191
- By:
- Publication type:
- Article
Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller.
- Published in:
- Computers, Materials & Continua, 2021, v. 69, n. 1, p. 373, doi. 10.32604/cmc.2021.017972
- By:
- Publication type:
- Article
Impact of Coronavirus Pandemic Crisis on Technologies and Cloud Computing Applications.
- Published in:
- Journal of Electronic Science & Technology, 2021, v. 19, n. 1, p. 25, doi. 10.1016/j.jnlest.2020.100059
- By:
- Publication type:
- Article
Straggler handling approaches in mapreduce framework: a comparative study.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 1, p. 375, doi. 10.11591/ijece.v11i1.pp375-382
- By:
- Publication type:
- Article
Earlier stage for straggler detection and handling using combined CPU test and LATE methodology.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 5, p. 4910, doi. 10.11591/ijece.v10i5.pp4910-4917
- By:
- Publication type:
- Article
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 10, p. 1687, doi. 10.3390/sym12101687
- By:
- Publication type:
- Article
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 9, p. 1544, doi. 10.3390/sym12091544
- By:
- Publication type:
- Article
Intrusion detection system based on a modified binary grey wolf optimisation.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 10, p. 6125, doi. 10.1007/s00521-019-04103-1
- By:
- Publication type:
- Article
Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks.
- Published in:
- PLoS ONE, 2020, v. 15, n. 5, p. 1, doi. 10.1371/journal.pone.0232574
- By:
- Publication type:
- Article
DHCPv6Auth: a mechanism to improve DHCPv6 authentication and privacy.
- Published in:
- Sādhanā: Academy Proceedings in Engineering Sciences, 2020, v. 45, n. 1, p. 1, doi. 10.1007/s12046-019-1244-4
- By:
- Publication type:
- Article
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
- Published in:
- IET Circuits, Devices & Systems (Wiley-Blackwell), 2019, v. 13, n. 6, p. 748, doi. 10.1049/iet-cds.2018.5079
- By:
- Publication type:
- Article
Labeled flow-based dataset of ICMPv6-based DDoS attacks.
- Published in:
- Neural Computing & Applications, 2019, v. 31, n. 8, p. 3629, doi. 10.1007/s00521-017-3319-7
- By:
- Publication type:
- Article