S El Madani, S Motahhir, A El Ghzizal - Multimedia Tools and Applications, 2022 - Springer
Abstract Internet of Vehicles (IoV) is a new concept, derived from combining VANET and Internet of Things (IoT), aiming at increasing road'user safety and reducing the number of …
Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet- based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …
The automatic detection of software vulnerabilities is considered a complex and common research problem. It is possible to detect several security vulnerabilities using static analysis …
M Jain, G Kaur - Cluster Computing, 2021 - Springer
Ever since the internet became part of the everyday lives of humans providing network security has been considered of utmost importance. Over the years lot of time and energy …
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …
S Mahdavi Hezavehi, R Rahmani - Cluster Computing, 2020 - Springer
Today, the providers of cloud computing services are among the most prominent service suppliers worldwide. Availability of cloud services is one of the most important concerns of …
SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information technology organizations and users' lives. Despite multiple benefits of cloud computing …
Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the …
Abstract Distributed Denial of Service (DDoS) plays a significant role in threatening the cloud-based services. DDoS is a kind of attack which targets the CPU, bandwidth and other …