A comprehensive study of DDoS attacks over IoT network and their countermeasures

P Kumari, AK Jain - Computers & Security, 2023 - Elsevier
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …

Machine learning techniques to detect a DDoS attack in SDN: A systematic review

TE Ali, YW Chong, S Manickam - Applied Sciences, 2023 - mdpi.com
The recent advancements in security approaches have significantly increased the ability to
identify and mitigate any type of threat or attack in any network infrastructure, such as a …

SGPL: An intelligent game-based secure collaborative communication scheme for metaverse over 5G and beyond networks

M Chen, A Liu, NN Xiong, H Song… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Human-centric communication metaverse relies on the convergent integration of multiple
existing technologies such as 5G and beyond networks, virtual reality, augmented reality …

A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks

M Chen, M Yi, M Huang, G Huang, Y Ren… - Expert Systems with …, 2023 - Elsevier
The openness of the intelligent vehicle network makes it easy for selfish or untrustworthy
vehicles to maliciously occupy limited resources in the mobile edge network or spread …

A review of the nist lightweight cryptography finalists and their fault analyses

H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …

Privacy-preserving healthcare monitoring for IoT devices under edge computing

W Cao, W Shen, Z Zhang, J Qin - Computers & Security, 2023 - Elsevier
With the rapid development of the Internet of Things (IoT) technology, e-healthcare has
received extensive attention because it is able to provide real-time health status feedback for …

Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach

I Ullah, HK Lim, YJ Seok, YH Han - Journal of Cloud Computing, 2023 - Springer
Edge-cloud computing is an emerging approach in which tasks are offloaded from mobile
devices to edge or cloud servers. However, Task offloading may result in increased energy …

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things

X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …

[HTML][HTML] A logic Petri net model for dynamic multi-agent game decision-making

H Byeon, C Thingom, I Keshta, M Soni… - Decision Analytics …, 2023 - Elsevier
This study proposes a logical Petri net model to leverage the modeling advantages of Petri
nets in handling batch processing and uncertainty in value passing and to integrate relevant …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …