DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

[PDF][PDF] Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.

S Behal, K Kumar - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Abstract Distributed Denial of Service (DDoS) attack imposes a severe threat to the
extensively used Internet based services like e-commerce, e-banking, transportation …

A tool for the generation of realistic network workload for emerging networking scenarios

A Botta, A Dainotti, A Pescapé - Computer Networks, 2012 - Elsevier
Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic
replication is a difficult and challenging task. Such difficulties are exacerbated by the …

SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks

NZ Bawany, JA Shamsi - Journal of Network and Computer Applications, 2019 - Elsevier
Evolution of smart cities induces critical challenges related to cyber and network security.
The increased reliance of a smart city on Information and Communication Technologies …

Measuring network throughput in the cloud: The case of Amazon EC2

V Persico, P Marchetta, A Botta, A Pescapè - Computer Networks, 2015 - Elsevier
Cloud providers employ sophisticated virtualization techniques and strategies for sharing
resources among a large number of largely uncoordinated and mutually untrusted …

VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation

C Madarasingha, SR Muramudalige, G Jourjon… - Computer Networks, 2022 - Elsevier
Video streaming traffic has been dominating the global network and the challenges have
exacerbated with the gaining popularity of interactive videos, aka 360° videos, as they …

[图书][B] Bee-inspired protocol engineering: from nature to networks

M Farooq - 2008 - books.google.com
Honey bee colonies demonstrate robust adaptive efficient agent-based communications and
task allocations without centralized controls–desirable features in network design. This book …

The flowchart interpreter for introductory programming courses

T Crews, U Ziegler - FIE'98. 28th Annual Frontiers in Education …, 1998 - ieeexplore.ieee.org
An introductory programming course offers students problem solving analysis and design
experience as well as exposure to the basic tenets of algorithmic thinking. Unfortunately …

Security anomaly detection in software‐defined networking based on a prediction technique

T Jafarian, M Masdari, A Ghaffari… - International Journal of …, 2020 - Wiley Online Library
Nowadays, software‐defined networking (SDN) is regarded as the best solution for the
centralized handling and monitoring of large networks. However, it should be noted that …

DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system

M Mittal, K Kumar, S Behal - Proceedings of the Indian National Science …, 2023 - Springer
The existing prominent research in the field of network security has extensively used publicly
available emulated datasets for validating the defense mechanisms. Although many …