A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid

H ElHussini, C Assi, B Moussa, R Atallah… - ACM Transactions on …, 2021 - dl.acm.org
With the growing market of Electric Vehicles (EV), the procurement of their charging
infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things …

[PDF][PDF] A review of recent detection methods for http ddos attacks

P Prajapati, N Patel, P Shah - International Journal of Scientific, 2019 - researchgate.net
There has been a tremendous increase in dependency on web technologies alongside
which its disruption attempts have also increased. Web servers that run on Hypertext …

Cloud of things: a systematic review on issues and challenges in integration of cloud computing and internet of things

S Singh, A Singh, V Goyal - … in Computing: Proceedings of ICRIC 2020, 2021 - Springer
Cloud computing and the Internet of things (IoT) are two diverse technologies having
complimentary relationship. The IoT generates massive amounts of data, and cloud …

[PDF][PDF] The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment.

A Dhanapal, P Nithyanandam - Scalable Comput. Pract. Exp., 2019 - researchgate.net
Cloud computing is the latest buzzword and cutting-edge technology. The cost-efficiency,
easy to operate, ondemand services, availability, makes the cloud so popular. The online …

Introducing a cloud based architecture for the distributed analysis of Real-Time Ethernet traffic

AC Turcato, AL Dias, GS Sestito… - … on Metrology for …, 2020 - ieeexplore.ieee.org
The use of industrial communication protocols based on Real-Time Ethernet (RTE)
standards is completely replacing traditional industrial fieldbuses. As usual, when a …

Distributed denial‐of‐service attack mitigation in network functions virtualization‐based 5G networks using management and orchestration

S Köksal, Y Dalveren, B Maiga… - International Journal of …, 2021 - Wiley Online Library
The fifth generation (5G) technology is expected to allow connectivity to billions of devices,
known as Internet of Things (IoT). However, IoT devices will inevitably be the main target of …

A Collaborative Approach to Detect DDoS Attacks in OpenStack-based Cloud using Entropy and Machine Learning

R Patil, G Kandakur, R Vardhamane… - 2023 14th …, 2023 - ieeexplore.ieee.org
Cloud computing involves optimizing the efficiency of data storage and processing through
the use of networking, various software, and internet services. In this context, network …

Application of MikroTik Firewall for Website Access Restriction and Prevention of DoS (Denial of Service) Attacks on Internet Networks Al-Mahrusiyah Vocational …

A Maulana, N Suharto… - … Network (Jurnal Jaringan …, 2023 - jartel.polinema.ac.id
Internet access is so easy that every level of society can access information from the
website. If internet access is used positively, it will produce positive things for its users as …

Smart home forensics: Identifying DDoS attack patterns on IoT devices

S Ho, H Greeson, U Karabiyik - 2022 - commons.erau.edu
Smart homes are becoming more common as more people integrate IoT devices into their
home environment. As such, these devices have access to personal data on their …

Implementation of machine learning based ddos attack detection system

R Bhargava, YP Singh… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
The DoS/DDoS attacks are intended to bring the availability of the online services down to
authentic users. The attacker seeds malware into the computers over the internet without the …