IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things

S Bilgili, AK Demir, S Alam - Internet of Things, 2024 - Elsevier
Abstract Named Data Networking (NDN) has emerged as a model to accommodate content
distribution, security, and mobility. Recently, NDN has been applied to the Internet of Things …

Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions

R Bukhowah, A Aljughaiman, MMH Rahman - Electronics, 2024 - mdpi.com
The Internet of Things (IoT) is a rapidly growing network that shares information over the
Internet via interconnected devices. In addition, this network has led to new security …

DETERMINING THE PATTERNS OF USING INFORMATION PROTECTION SYSTEMS AT FINANCIAL INSTITUTIONS IN ORDER TO IMPROVE THE LEVEL OF …

S Onyshchenko, Y Zhyvylo… - … -European Journal of …, 2023 - search.ebscohost.com
This paper reports a study aimed at determining the features of using information protection
systems at financial institutions in order to improve the level of financial security. It has been …

An automated intrusion detection system in IoT system using attention based deep bidirectional sparse auto encoder model

K Swathi, GH Bindu - Knowledge-Based Systems, 2024 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) is a smart network connected to the Internet
for transmitting gathered data with verified protocols. Attackers frequently use …

The spectre of surveillance and censorship in future internet architectures

M Wrana, D Barradas, N Asokan - arXiv preprint arXiv:2401.15828, 2024 - arxiv.org
Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet
to improve performance, scalability, and security. However, some governments perceive …

ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet

S Adhikari, S Ray, MS Obaidat, GP Biswas - Wireless Personal …, 2023 - Springer
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm
to cope up with the recent growing demand of content delivery. CCN reduces the network …

Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

A Hidouri, H Touati, M Hadded, N Hajlaoui… - Computer Networks, 2023 - Elsevier
Abstract The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to
Named Data Networks (NDN). This attack can impact the caching process in various ways …

IMPROVING THE EFFICIENCY OF DIAGNOSING ERRORS IN COMPUTER DEVICES FOR PROCESSING ECONOMIC DATA FUNCTIONING IN THE CLASS OF …

S Onyshchenko, A Yanko… - … -European Journal of …, 2023 - search.ebscohost.com
This paper proposes an improved method for diagnosing errors of computer devices, which
process economic data in computer systems, by increasing efficiency. The object of research …

Інформаційно-аналітичне забезпечення фінансової безпеки підприємств у сучасних умовах

СВ Онищенко, АД Глушко - 2023 - reposit.nupp.edu.ua
В умовах цифровізації бізнес-середовища інформаційно-аналітичне забезпечення,
безперечно, є основою фінансової безпеки на макро-та мікрорівні. Вплив інформаційно …

FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking

M Soltani, B Barekatain, F Hendesi… - The Journal of …, 2023 - Springer
The appropriate output interface (forwarding) has recently emerged as a key challenge
affecting the performance of Named Data Networking (NDN). Regarding this matter, a novel …