[1]
|
A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)
|
|
Advances in Malware and Data-Driven …,
2022 |
|
|
[2]
|
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future …
|
|
International Journal on Semantic Web and …,
2022 |
|
|
[3]
|
Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System
|
|
Nawasrah, A Almomani… - Journal of Web …,
2022 |
|
|
[4]
|
Deep-Learning and Machine-Learning-Based Techniques for Malware Detection and Data-Driven Network Security
|
|
Advances in Malware and Data …,
2022 |
|
|
[5]
|
Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
|
|
Cyber Security, Privacy and Networking,
2022 |
|
|
[6]
|
The Era of Advanced Machine Learning and Deep Learning Algorithms for Malware Detection
|
|
Advances in Malware …,
2022 |
|
|
[7]
|
Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach
|
|
Advances in Malware and Data …,
2022 |
|
|
[8]
|
Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers
|
|
Computers & Electrical …,
2022 |
|
|
[9]
|
Deep reinforcement learning for optimal denial-of-service attacks scheduling
|
|
Science China Information Sciences,
2022 |
|
|
[10]
|
Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
|
|
2021 |
|
|
[11]
|
A big data and deep learning based approach for ddos detection in cloud computing environment
|
|
2021 IEEE 10th Global …,
2021 |
|
|
[12]
|
An improved agent protection model for distributed denial of service flooding attack traffics
|
|
2021 |
|
|
[13]
|
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
|
|
International Conference on …,
2021 |
|
|
[14]
|
Entropy-based DDoS Attack Detection in Cluster-based Mobile Ad Hoc Networks.
|
|
Adhoc & Sensor Wireless Networks,
2021 |
|
|
[15]
|
An Auction-Based Incentivized Solution Against DDoS Attacks
|
|
2021 |
|
|
[16]
|
CNA Tactics and Techniques: A Structure Proposal
|
|
2021 |
|
|
[17]
|
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
|
|
2021 |
|
|
[18]
|
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic
|
|
Neural Computing and …,
2021 |
|
|
[19]
|
BB Gupta
|
|
Int. J. Innovative Computing and Applications,
2021 |
|
|
[20]
|
Detecção de DDoS por aprendizado de máquina
|
|
2021 |
|
|
[21]
|
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack
|
|
2020 |
|
|
[22]
|
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
|
|
2020 |
|
|
[23]
|
Designing interconnected haptic interfaces and actuators for teleoperations in mobile ad hoc networks
|
|
2020 |
|
|
[24]
|
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
|
|
2020 |
|
|
[25]
|
A Survey on Security in VANETs
|
|
2020 |
|
|
[26]
|
A deep learning based HTTP slow DoS classification approach using flow data
|
|
2020 |
|
|
[27]
|
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
|
|
2020 |
|
|
[28]
|
Perbandingan Kinerja Protokol ZRP (Zone Routing Protocol) dan HWMP (Hybrid Wireless Mesh Protocol) pada MANET (Mobile Ad hoc Network)
|
|
2020 |
|
|
[29]
|
A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
|
|
2020 |
|
|
[30]
|
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
|
|
2020 |
|
|
[31]
|
The detection method of low-rate DoS attack based on multi-feature fusion
|
|
2020 |
|
|
[32]
|
Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions
|
|
2020 |
|
|
[33]
|
Factors Encouraging and Deterring Illegal Computer Hacking: Replicating and Extending Young and Zhang's Treatise on Illegal Computer Hacking
|
|
2019 |
|
|
[34]
|
Machine learning for computer and cyber security: principle, algorithms, and practices
|
|
2019 |
|
|
[35]
|
Performance Analysis of Network Intrusion Detection System using Machine Learning
|
|
International Journal of Advanced Computer Science and Applications,
2019 |
|
|
[36]
|
Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices
|
|
2019 |
|
|
[37]
|
Designing an Internet of Things Attack Simulator
|
|
2019 |
|
|
[38]
|
AN ENERGY EFFICIENT V-LEACH ROUTING PROTOCOL IN WSN USING OPTIMIZATION TECHNIQUE
|
|
2019 |
|
|
[39]
|
Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi
|
|
2019 |
|
|
[40]
|
Smart Card Security: Applications, Attacks, and Countermeasures
|
|
2019 |
|
|
[41]
|
Security in the internet of things: recent challenges and solutions
|
|
2019 |
|
|
[42]
|
Machine Learning for Computer and Cyber Security
|
|
2019 |
|
|
[43]
|
aODV routing protocol using Dynamic trust handshake-based Malicious Behavior Detection
|
|
2019 |
|
|
[44]
|
Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
|
|
2019 |
|
|
[45]
|
Comparative study of intrusion detection system using machine learning
|
|
2019 |
|
|
[46]
|
Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP
|
|
2018 |
|
|
[47]
|
Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
|
|
2018 |
|
|
[48]
|
A Review on Information Security Program Development and Management
|
|
2018 |
|
|
[49]
|
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
|
|
International Journal of E-Services and Mobile Applications (IJESMA),
2018 |
|
|
[50]
|
SECURITY METHODS AGAINST TCP SYN FLOODING DDOS ATTACKS IN WIRELESS NETWORKS-A SURVEY
|
|
2018 |
|
|
[51]
|
An efficient DDoS detection based on SU-Genetic feature selection
|
|
Cluster Computing,
2018 |
|
|
[52]
|
Anomaly Detection in Networks Using Machine Learning
|
|
2018 |
|
|
[53]
|
Security methods against tcp syn flooding ddos attacks in wireless networksa survey
|
|
2018 |
|
|
[54]
|
Assessment of Honeypots: Issues, Challenges and Future Directions
|
|
International Journal of Cloud Applications and Computing (IJCAC),
2018 |
|
|
[55]
|
Implementation of a personal area network for secure routing in MANETs by using low-cost hardware
|
|
2017 |
|
|
[56]
|
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
|
|
Arabian Journal for Science and Engineering,
2017 |
|
|
[57]
|
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
|
|
Cluster Computing,
2017 |
|
|
[58]
|
Security in Internet of Things: issues, challenges, taxonomy, and architecture
|
|
Telecommunication Systems,
2017 |
|
|
[59]
|
Mitigate denial of service attacks in mobile ad-hoc networks
|
|
2017 |
|
|
[60]
|
Secure Routing-Solution to Diminish DOS Attack in AODV Based MANET
|
|
2017 |
|
|
[61]
|
Fighting against phishing attacks: state of the art and future challenges
|
|
Neural Computing and Applications,
2016 |
|
|
[62]
|
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
|
|
Neural Computing and Applications,
2016 |
|
|
[63]
|
Trust or reputation base encryption decryption technique for preventing network from DOS attack in MANET
|
|
2016 |
|
|
[64]
|
Toward Securing MANET Against the Energy Depletion Attack
|
|
International Conference on Risks and Security of Internet and Systems,
2015 |
|
|
[65]
|
Proposed Method to Enhance the Performance of AOMDV under DDOS Attack
|
|
2015 |
|
|
[66]
|
Improved EAACK scheme for detection and isolation of a malicious node in MANET
|
|
2015 |
|
|
[67]
|
Proposed Method to Enhance the Performance of AOMDV under DDOS Attack.
|
|
International Journal of Security & Its Applications,
2015 |
|
|
[68]
|
Security Mechanism for Mitigation of Flooding Attack under Group Mobility Model in MANET.
|
|
International Journal of Applied Engineering Research,
2015 |
|
|
[69]
|
A Review on Mobile Ad-hoc Networks (MANET'S) with Attacks Impact
|
|
Imperial Journal of Interdisciplinary Research,
2015 |
|
|
[70]
|
A modified algorithm to improve security and performance of AODV protocol against black hole attack
|
|
Wireless Networks,
2015 |
|
|
[71]
|
A Survey on Discovery of Distributed Denial of Service Attacks in Cloud
|
|
International Journal of Computer Science Issues (IJCSI),
2015 |
|
|
[72]
|
Implementation of personal area network for secure routing in MANET by using low cost hardware
|
|
2015 |
|
|
[73]
|
EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR 2 (NS-2)
|
|
TRANSIENT,
2015 |
|
|
[74]
|
EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR …
|
|
2015 |
|
|
[75]
|
A Novel Approach on Sat Kaman Protocol to Prevent DOS Attack in MANET
|
|
2015 |
|
|
[76]
|
A Novel Technique to Detect & Prevent Black & Gray Hole Attacks in Manet using TVRI Approach
|
|
2015 |
|
|
[77]
|
A review on mobile ad-hoc network (MANETs) with Attacks and Impact
|
|
2015 |
|
|
[78]
|
A review on mobile ad-hoc network MANETs with Attacks and Impact
|
|
2015 |
|
|
[79]
|
An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)
|
|
Research Journal of Applied Sciences, Engineering and Technology,
2014 |
|
|
[80]
|
A Modified AODV-Mechanism to Prevent Root Request Flooding Attack in Mobile Adhoc Networks
|
|
EN Mohil, MK Dhankhar - ijritcc.org,
2014 |
|
|
[81]
|
A survey of the mitigation methods against DoS attacks on MANETs
|
|
Science and Information Conference (SAI), 2014. IEEE,
2014 |
|
|
[82]
|
Energy Attentive Multicast Routing Protocol for MANETs
|
|
|
|
|
[83]
|
Analysis of Deep learning models for Recognition and Interpretation of Indian Sign
|
|
|
|
|
[84]
|
Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
|
|
|
|
|
[85]
|
Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
|
|
|
|
|
[86]
|
A Novel Ddos Attack Detection Framework for Software-Defined Iot (Sd-Iot) Networks Using Machine Learning
|
|
|
|
|
[87]
|
IoT Security using Machine Learning Techniques
|
|
|
|
|
[88]
|
Cyber Security Traits of a Future-Ready Organization
|
|
|
|
|
[89]
|
Analysis of Machine learning based XSS attack Detection Techniques
|
|
|
|
|
[90]
|
Top 50 Cyber Security Tools for IT and Business Professionals in 2022
|
|
|
|
|
[91]
|
Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP Sebagai Protokol Routing Pada Mobile Ad-Hoc Network (MANET)
|
|
|
|
|