A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network

EH Abualsauod - Computers and Electrical Engineering, 2022 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) offer a huge amount of potential in a variety of
applications, including healthcare, medical, traffic monitoring, military, and industry. UAVs …

Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks

JB Awotunde, S Misra - Illumination of artificial intelligence in cybersecurity …, 2022 - Springer
Security has been a concern in recent years, especially in the Internet of Things (IoT) system
environment, where security and privacy are of great importance. Our lives have significantly …

Fast and accurate classifying model for denial-of-service attacks by using machine learning

MI Kareem, MN Jasim - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
A denial of service (DoS) attack is one of the dangerous threats to networks that Internet
resources and services will be less available, as they are easily operated and difficult to …

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments

H Zhou, S Pal, Z Jadidi, A Jolfaei - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is a developing research area with potential global
Internet connectivity, turning everyday objects into intelligent devices with more autonomous …

[PDF][PDF] Cooperative Detection Method for DDoS Attacks Based on Blockchain.

J Cheng, X Yao, H Li, H Lu, N Xiong, P Luo… - Comput. Syst. Sci …, 2022 - cdn.techscience.cn
Distributed Denial of Service (DDoS) attacks is always one of the major problems for service
providers. Using blockchain to detect DDoS attacks is one of the current popular methods …

[PDF][PDF] ICT Policy Implementation as Correlate for Achieving Educational Sustainability: Approaching Development in Multi ICT Dimensions

UO Matthew, JS Kazaure, AS Kazaure… - Journal of Information …, 2022 - academia.edu
The advancement in the national policy with regard to Information Communication
Technologies (ICTs) in education has been updated by the demand for consistent and …

Addressing the effectiveness of DDoS-attack detection methods based on the clustering method using an ensemble method

A Zeinalpour, HA Ahmed - Electronics, 2022 - mdpi.com
The curse of dimensionality, due to lots of network-traffic attributes, has a negative impact on
machine learning algorithms in detecting distributed denial of service (DDoS) attacks. This …

DDoS attack detection using hybrid machine learning based IDS models

S Sumathi, R Rajesh, N Karthikeyan - Journal of Scientific & …, 2022 - op.niscpr.res.in
A kind of cyber-attack that severely paralyzes the victim server by injecting illegitimate
packets of data is a DDoS attack, which is progressive in nature. Therefore its detection is a …

Comparative analysis to identify the effective machine learning method for prediction of DDOS attack

N Gulia, K Solanki, S Dalal - 2022 10th International …, 2022 - ieeexplore.ieee.org
DDOS is a critical and common attack that affects the performance and reliability of the
network. In this attack, the network traffic is increased anonymously on a particular node or …

A novel cloud security enhancement scheme to defend against DDoS attacks by using deep learning strategy

RS Prabhu, A Prema, E Perumal - 2022 6th international …, 2022 - ieeexplore.ieee.org
Cloud computing is a recent technology that allows users to create services on-demand.
Cloud computing has achieved benefits as a result of its self-service capability as well as on …