A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

A novel statistical technique for intrusion detection systems

E Kabir, J Hu, H Wang, G Zhuo - Future Generation Computer Systems, 2018 - Elsevier
This paper proposes a novel approach for intrusion detection system based on sampling
with Least Square Support Vector Machine (LS-SVM). Decision making is performed in two …

Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services

R Xu, Y Cheng, Z Liu, Y Xie, Y Yang - Future Generation Computer Systems, 2020 - Elsevier
The rapid rising of artificial intelligence (AI) and Internet of Things technologies leads to the
accumulation of abundant communication data without being processed on time, which …

Covert rate maximization in wireless full-duplex relaying systems with power control

R Sun, B Yang, S Ma, Y Shen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the fundamental covert rate performance in a wireless relaying
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …

Preventing ddos using bloom filter: A survey

R Patgiri, S Nayak, SK Borgohain - arXiv preprint arXiv:1810.06689, 2018 - arxiv.org
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue
in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a …

Personalized app recommendation based on app permissions

M Peng, G Zeng, Z Sun, J Huang, H Wang, G Tian - World Wide Web, 2018 - Springer
With the development of science and technology, the popularity of smart phones has made
exponential growth in mobile phone application market. How to help users to select …

Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective

Y Zhang, Y Shen, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper investigates the fundamental issues of mode selection and spectrum partition in
cellular networks with in-band device-to-device (D2D) communication from the physical …

An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control

F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao… - World Wide Web, 2018 - Springer
As a kind of medical service around people, community health care is closely related to
peoples lives, and thus it has also been placed higher requirements. In the face of growing …

Elastic Optimization for Stragglers in Edge Federated Learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

[图书][B] Access Control Management in Cloud Environments

H Wang, J Cao, Y Zhang - 2020 - Springer
This book introduces new business concepts on cloud environments such as secure,
scalable anonymity and practical payment protocols for the Internet of Things and …