[HTML][HTML] A standalone photovoltaic/battery energy-powered water quality monitoring system based on narrowband internet of things for aquaculture: Design and …

C Jamroen, N Yonsiri, T Odthon, N Wisitthiwong… - Smart Agricultural …, 2023 - Elsevier
This study presents a standalone photovoltaic (PV)/battery energy storage (BES)-powered
water quality monitoring system based on the narrowband internet of things (NB-IoT) for …

Distributed Denial of Service Attack in HTTP/2: Review on Security Issues and Future Challenges

L Ming, YB Leau, Y Xie - IEEE Access, 2024 - ieeexplore.ieee.org
This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and
conducts an analysis of the security threats and DDoS attack typologies associated with …

Cybersecurity for Battlefield of Things—A Comprehensive Review

A Singh, G Sharma, R Krishnamurthi… - Journal of Circuits …, 2022 - World Scientific
Battlefield of Things (BoT) is a modern defense network that connects smart military devices
to strategic networks. Cybersecurity plays a vital role in maintaining the security of BoT …

Delays have Dangerous Ends: Slow HTTP/2 DoS attacks into the Wild and their Real-Time Detection using Event Sequence Analysis

N Tripathi - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Jon Postel's robustness principle states that the communicating entities should be liberal
while accepting the data. Several web servers on the Internet do follow this principle as they …

MFGD3QN: Enhancing Edge Intelligence Defense against DDoS with Mean-Field Games and Dueling Double Deep Q-network

S Shen, C Cai, Y Shen, X Wu, W Ke… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to the stability and
security of edge intelligence devices. To solve this issue, we first describe the cost of edge …

Hypertext transfer protocol performance analysis in traditional and software defined networks during Slowloris attack.

AA Murthy, PM John… - … Journal of Electrical …, 2023 - search.ebscohost.com
The extensive use of the internet has resulted in novel technologies and protocol
improvisation. Hypertext transfer protocol/1.1 (HTTP/1.1) is widely adapted on the internet …

5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture

N Wehbe, HA Alameddine… - 2023 IFIP Networking …, 2023 - ieeexplore.ieee.org
Fifth Generation (5G) core network leverages the application-layer Hypertext Transfer
Protocol version 2 (HTTP/2) to enable the communication between the Network Functions …

Convolutional neural network-based automatic diagnostic system for AL-DDoS attacks detection

FJ Abdullayeva - International Journal of Cyber Warfare and …, 2022 - igi-global.com
Distributed denial of service (DDoS) attacks are one of the main threats to information
security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to …

HTTP/2 Web Performance Characteristics with Link-aggregation Mode Under DDoS Attack

K Rattanaopas, P Wattanakul - 2024 12th International …, 2024 - ieeexplore.ieee.org
The HTTP/2 Web server is widely used in Internet service. Furthermore, attacks known as
distributed denial-of service, or DDoS, were popping up online. HTTP/2 not only allows …

Advanced Strategies for Application Layer DDoS Attacks Using http Flooding Technique

R Musrifa, R Arfah, O Yamaesa, H Firdaus… - Novice Research …, 2024 - eksplorasi.org
In today's interconnected digital landscape, the threat of Distributed Denial of Service
(DDoS) attacks targeting application layer protocols poses significant challenges to web …