[HTML][HTML] Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

[HTML][HTML] Machine learning-based dynamic attribute selection technique for ddos attack classification in iot networks

S Ullah, Z Mahmood, N Ali, T Ahmad, A Buriro - Computers, 2023 - mdpi.com
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of
interconnected systems, which has also increased the vulnerability of IoT devices to security …

A lightweight approach to smart contracts supporting safety, security, and privacy

O Owe, E Fazeldehkordi - Journal of Logical and Algebraic Methods in …, 2022 - Elsevier
The concept of smart contract represents one of the most attractive uses of blockchain
technology and has the advantage of being transparent, immutable, and corruption-free …

Distributed Denial of Service (DDoS) Mitigation: Security Awareness Domain and Resources (SADAR)

TS Hidayat, Y Fadillah, M Lubis, AR Lubis - Proceedings of the 10th …, 2022 - dl.acm.org
Information security is a constantly evolving field to safeguard confidentiality, integrity and
assets with defensive measures should be developed and planned to improve information …

[PDF][PDF] Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight. Symmetry 2021, 13, 227

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - 2021 - academia.edu
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

[PDF][PDF] Static Detection of Distributed Denial of Service Attacks in Active Object Systems

E Fazeldehkordi, O Owe… - iFM'19 on Formal … - hvlopen.brage.unit.no
In this paper, our aim is to develop an additional layer of defense in distributed agent
systems to combat such threats. We consider a high-level imperative and object-oriented …