An accurate security game for low-resource IoT devices

H Sedjelmaci, SM Senouci… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) technology incorporates a large number of heterogeneous
devices connected to untrusted networks. Nevertheless, securing IoT devices is a …

An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks

H Sedjelmaci, SM Senouci… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are wireless networks that provide high-rate data
communication among moving vehicles and between the vehicles and the road-side units …

An effective network traffic classification method with unknown flow detection

J Zhang, C Chen, Y Xiang, W Zhou… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Traffic classification technique is an essential tool for network and system security in the
complex environments such as cloud computing based environment. The state-of-the-art …

Resilience analysis of power grids under the sequential attack

Y Zhu, J Yan, Y Tang, YL Sun… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The modern society increasingly relies on electrical service, which also brings risks of
catastrophic consequences, eg, large-scale blackouts. In the current literature, researchers …

An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks

A Mohajerani, D Gharavian - Wireless Networks, 2016 - Springer
Reducing the energy consumption of network nodes is one of the most important problems
for routing in wireless sensor networks because of the battery limitation in each sensor. This …

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

W Meng, W Li, LT Yang, P Li - International Journal of Information Security, 2020 - Springer
Due to the rapid growth of computer networks, intrusions have become more complicated
and devastating. As an important solution, collaborative intrusion detection networks or …

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have
the ability to communicate with each other without having fixed network infrastructure or any …

Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more
complex to date. To enhance the detection performance, collaborative intrusion detection …

Active learning to detect DDoS attack using ranked features

RK Deka, DK Bhattacharyya, JK Kalita - Computer Communications, 2019 - Elsevier
Network traffic classification to detect DDoS attacks is challenging in the context of high-
speed networks. In this paper, we discuss the need for distributed feature selection in …

Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks

N Saxena, BJ Choi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Navigating security and privacy challenges is one of the crucial requirements in the vehicle-
to-grid (V2G) network. Since electric vehicles (EVs) need to provide their private information …