The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security …
O Owe, E Fazeldehkordi - Journal of Logical and Algebraic Methods in …, 2022 - Elsevier
The concept of smart contract represents one of the most attractive uses of blockchain technology and has the advantage of being transparent, immutable, and corruption-free …
TS Hidayat, Y Fadillah, M Lubis, AR Lubis - Proceedings of the 10th …, 2022 - dl.acm.org
Information security is a constantly evolving field to safeguard confidentiality, integrity and assets with defensive measures should be developed and planned to improve information …
S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - 2021 - academia.edu
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the …
In this paper, our aim is to develop an additional layer of defense in distributed agent systems to combat such threats. We consider a high-level imperative and object-oriented …