A comprehensive survey on the applications of blockchain for securing vehicular networks

T Alladi, V Chamola, N Sahu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Vehicular networks promise features such as traffic management, route scheduling, data
exchange, entertainment, and much more. With any large-scale technological integration …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Secure integration of IoT and cloud computing

C Stergiou, KE Psannis, BG Kim, B Gupta - Future Generation Computer …, 2018 - Elsevier
Abstract Mobile Cloud Computing is a new technology which refers to an infrastructure
where both data storage and data processing operate outside of the mobile device. Another …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

Privacy-preserving outsourced classification in cloud computing

P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen - Cluster Computing, 2018 - Springer
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …

Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

A Dahiya, BB Gupta - Future Generation Computer Systems, 2021 - Elsevier
DDoS attack is one of the most powerful cyber-weapons as it does not wait for a specific
server configuration or particular network state to attack or to disrupt any operation of the …

[HTML][HTML] A survey of fault tolerance in cloud computing

P Kumari, P Kaur - Journal of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing has brought about a transformation in the delivery model of information
technology from a product to a service. It has enabled the availability of various software …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …