A survey of fog computing-based healthcare big data analytics and its security

R Priyadarshini, RK Barik, HC Dubey… - International Journal of …, 2021 - igi-global.com
Growing use of wearables within internet of things (IoT) creates ever-increasing multi-modal
data from various smart health applications. The enormous volume of data generation …

Securing the Fog Computing Environment and Enhancing Resource Allocation

P Harikrishna, R Kaviarasan - Wireless Personal Communications, 2024 - Springer
Ever since the advent of computers, the burden of human beings has reduced drastically.
But even computers were resource constraint, so cloud computing was born. Cloud …

DDoS attack detection using enhanced long-short term memory with hybrid machine learning algorithms

M Sinthuja, K Suthendran - 2022 3rd International Conference …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) environment's heterogeneous components make the distributed
denial-of-service (DDoS) attack a security challenge. The dependency on the network …

Multi-layer ensemble deep reinforcement learning based DDoS attack detection and mitigation in cloud-SDN environment

SA Christila, R Sivakumar - 2022 4th International Conference …, 2022 - ieeexplore.ieee.org
Cloud computing (CC) remains as a promising environment which offers scalable and cost
effectual computing facilities. The combination of the SDN technique with the CC platform …

Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis

MAR Putra, T Ahmad… - 2023 11th International …, 2023 - ieeexplore.ieee.org
Botnet malware is a malicious activity that needs to be detected accurately. Several botnet
detection models have been introduced using a mining-based method. The distribution …

[PDF][PDF] A efficient method to detect DDos attack in cloud computing

AH Alashjaee, RA Jabeur - Int J, 2022 - academia.edu
Electronic networks and cloud servers face many security problems since they are
vulnerable to DDOS attacks. As cloud servers are exposed to attacks similar to legitimate …

Recent advancements in the state of cloud security in cyber physical systems

J Verma, A Bhandari, G Singh - Security and Resilience of Cyber …, 2022 - taylorfrancis.com
Recent advancements in information technology and the ever-increasing sophistication of
digital networks have compelled creating the orchestration of intelligent technologies: cyber …

[PDF][PDF] Smart Cities' Cybersecurity and IoT: Challenges and Future Research Directions.

KK Ishak, NA Mat Razali, NA Malizan, G Sulong… - … International Journal of …, 2024 - iaeng.org
Smart Cities rely on the Internet of Things (IoT) which is characterised by its diverse,
distributed and complex infrastructure. These complexities present a range of cybersecurity …

[PDF][PDF] Monitoring of link-level congestion in telecommunication systems using information criteria

N Yakymchuk, Y Selepyna, M Yevsiuk… - … w gospodarce i …, 2022 - bibliotekanauki.pl
The successful functioning of telecommunication networks largely depends on the
effectiveness of algorithms for detection andprotection against overloads. The article …

An exploration into secure IoT networks using deep learning methodologies

B Chempavathy, VM Deshmukh, A Datta… - … for Advancement in …, 2022 - ieeexplore.ieee.org
With Internet of Things (IoT) emerging as a new technology connecting few devices at home
to billions of devices at corporate, the prices of such connected devices have become …