[HTML][HTML] EFAW: a new mining attack model combining FAW attacks with the Eclipse attack

J Wang, Z Wang - Journal of Surveillance, Security and Safety, 2023 - oaepublish.com
Aim The Proof-of-Work consensus mechanism is the core mechanism of the blockchain, but
the existing Fork After Withholding (FAW) attack can earn more rewards by launching attacks …

Classification of DDoS traffic for Industrial Internet of Services using Deep learning approaches

G Qaiser, S Chandrasekaran, R Chai… - … , and Internet of Things …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Services (IIoS) combines traditional industrial systems with digital
technologies, offering numerous advantages like improved efficiency, productivity, and …

Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls.

AD Tudosi, A Graur, DG BALAN… - … in Electrical & …, 2023 - search.ebscohost.com
Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain
unauthorized access to vulnerable systems. Firewalls and antivirus software are essential …

Privacy and security issues in fog-to-fog communication: A survey

T Murkomen - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
The rapid growth of Fog Computing has brought a paradigm shift in data processing and
communication, presenting various benefits such as reduced latency, efficient data …

Analysis and Implementation of DDOS Attacks and Prevention

A Sharma, P Chawla, S Tyagi, M Goyal… - … on Advances in …, 2023 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks remain a pervasive threat in the digital
landscape, continually challenging organizations worldwide. Our study employs the Slow …

Understanding the Impact of IoT Security Patterns on CPU Usage and Energy Consumption on IoT Devices

S Jamshidi, A Nikanjam, N Kawser, F Khomh… - Authorea …, 2024 - techrxiv.org
Abstract The Internet of Things (IoT) has given rise to numerous security issues that require
effective solutions. IoT security patterns have been suggested as an effective approach to …

Cloud Security Risks, Threats, and Solutions for Business Logistics

S Tiwari, RS Wadawadagi, AK Singh… - … and Security in Cloud …, 2024 - igi-global.com
Cloud computing has revolutionized the landscape of modern business logistics by offering
scalable and cost-effective solutions for data storage, processing, and application …

Trends and Challenges in AIoT Implementation for Smart Home, Smart Buildings, and Smart Cities in Cloud Platforms

V Santhi, YNVS Sabareesh, PP Sudheer… - Artificial Intelligence of …, 2024 - igi-global.com
Smart homes, smart buildings, and smart cities increase the quality of living by creating a
world that is better and more secure, reducing dependency on human needs and efforts …

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions

W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …

[PDF][PDF] DETECTION AGAINST SIGNATURE-BASED DETECTION IN IOT NETWORKS

M Schrötter, A Niemann, B Schnor - 2024 - techrxiv.org
Over the last few years, a plethora of papers presenting machine learning-based
approaches for intrusion detection has been published. However, the majority of those …