Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
analysis of various methods ranging from no encryption to … Using these various encryption
protocols with varying key … to combat these attacks is to use VPNs typically using layer-2 …

Security analysis in satellite communication based on geostationary orbit

JK Pedersen, M Bøchman… - 2022 19th Annual …, 2022 - ieeexplore.ieee.org
… , such as protocols that are not using any sort of encryption. … to dig into satellite dishes for
a full eavesdrop attack, and … providers are discovered using this band for communication. …

Insight2: A modular visual analysis platform for network situational awareness in large-scale networks

HADE Kodituwakku, A Keller, J Gregor - Electronics, 2020 - mdpi.com
… ) encryption to thwart man-in-the-middle (MITM) attacks. … the analysis when determining
which services were attackedattacks based on the destination port numbers and protocols. …

[HTML][HTML] Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

W Meng, W Li, LT Yang, P Li - International Journal of Information Security, 2020 - Springer
… requesting every potential validator to have a secure and random waiting time from a trusted
… They also performed a further analysis of PMFA and found that advanced insider attack is a …

A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks

AR Rajeswari, WC Lai, C Kavitha… - Electronics, 2023 - mdpi.com
… Routing Protocol (CBRP) for dividing nodes into clusters, … ] was designed to counter sleep
deprivation attacks. ANFIS detects … The datasets used and/or analyzed during the current study …

Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation

W Li, W Meng, J Parra-Arnau… - … Dependable and Secure …, 2021 - ieeexplore.ieee.org
… approach is more robust to newcomer attacks (or called new entry attack), where an attacker
… , “DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis,…

[HTML][HTML] Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
… The strong encryption used to secure … ’s protocol, analyzing a family of delaying attacks
and extending them to other protocols, and giving the first rigorous consistency analysis of …

Towards blockchained challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - … and Network Security Workshops: ACNS 2019 …, 2019 - Springer
… The strong encryption used to secure blockchains … ’s protocol, analyzing a family of delaying
attacks and extending them to other protocols, giving the first rigorous consistency analysis

[PDF][PDF] Security for Handover and D2D Communication in 5G HetNets

A Ozhelvaci, M Ma - 2020 - researchgate.net
… (iii) We analyze the security evaluation techniques and discuss the existing tools for the …
DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/…

Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities

R Kait, S Kaur, P Sharma, C Ankita, T Kumar… - Expert …, 2024 - Wiley Online Library
… study that determines the secure path for data dissemination. … to all and more vulnerable to
attacks by malicious nodes. A … article as no new data were created or analyzed in this study. …