Attack and defense strategies for intrusion detection in autonomous distributed IoT systems

H Al-Hamadi, R Chen, DC Wang, M Almashan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we develop a methodology to capture and analyze the interplay of attack-
defense strategies for intrusion detection in an autonomous distributed Internet of Things …

Blockchain as a service environment: a dependability evaluation

LF Correia, JR Dantas, FA Silva - The Journal of Supercomputing, 2023 - Springer
Blockchain has become an important processing paradigm in recent years. The blockchain
supports financial transactions and validates contracts, documents and data. However, the …

Cloud firewall under bursty and correlated data traffic: A theoretical analysis

GHS Carvalho, I Woungang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud firewalls stand as one of the major building blocks of the cloud security framework
protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of …

Analisis Throughput dan High Availability Firewall sebagai Virtualized Network Function pada VMware ESXI

AT Azzam, R Munadi, R Mayasari - Prosiding SENIATI, 2019 - ejournal.itn.ac.id
Seiring dengan berkembangnya dunia industri IT, teknologi virtualisasi perlahan-lahan
mulai digunakan untuk membangun infrastruktur jaringan yang disebut dengan Network …