M Mittal, K Kumar, S Behal - Soft computing, 2023 - Springer
In today's world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutes has shifted …
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a …
EUH Qazi, A Almorjan, T Zia - Applied Sciences, 2022 - mdpi.com
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, eg, health care, smart …
Abstract Distributed Denial of Service (DDoS) attacks represent a major concern in modern Software Defined Networking (SDN), as SDN controllers are sensitive points of failures in …
N Yadav, S Pande, A Khamparia… - … and Mobile Computing, 2022 - Wiley Online Library
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the …
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used …
The advent of cloud computing has made a global impact by providing on-demand services, elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
The complexity of network intrusion detection systems (IDSs) is increasing due to the continuous increases in network traffic, various attacks and the ever-changing network …
A distributed denial-of-service (DDoS) attack is one of the most pernicious threats to network security. DDoS attacks are considered one of the most common attacks among all network …