The role of national cybersecurity strategies on the improvement of cybersecurity education

S AlDaajeh, H Saleous, S Alrabaee, E Barka… - Computers & …, 2022 - Elsevier
Digital information and telecommunication technologies have not only become essential to
individuals' daily lives but also to a nation's sustained economic growth, societal well-being …

A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions

R Chaganti, B Bhushan, V Ravi - Computer Communications, 2023 - Elsevier
With the proliferation of new technologies such as the Internet of Things (IoT) and Software-
Defined Networking (SDN) in recent years, the Distributed Denial of Service (DDoS) attack …

[HTML][HTML] Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

[HTML][HTML] Blockchain for securing ai applications and open innovations

R Shinde, S Patil, K Kotecha, K Ruikar - Journal of Open Innovation …, 2021 - mdpi.com
Nowadays, open innovations such as intelligent automation and digitalization are being
adopted by every industry with the help of powerful technology such as Artificial Intelligence …

The role of Blockchain in DDoS attacks mitigation: techniques, open challenges and future directions

R Chaganti, B Bhushan, V Ravi - arXiv preprint arXiv:2202.03617, 2022 - arxiv.org
With the proliferation of new technologies such as Internet of Things (IOT) and Software-
Defined Networking (SDN) in the recent years, the distributed denial of service (DDoS) …

Privacy-preserving and security in SDN-based IoT: A survey

H Ahmadvand, C Lal, H Hemmati, M Sookhak… - IEEE …, 2023 - ieeexplore.ieee.org
In recent years, the use of Software Defined Networking (SDN) has increased due to various
network management requirements. Using SDN in computer network applications has …

[HTML][HTML] Decentralized actionable cyber threat intelligence for networks and the internet of things

D Mendez Mena, B Yang - IoT, 2020 - mdpi.com
Security presents itself as one of the biggest threats to the enabling and the deployment of
the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity …

A survey on cyber threat intelligence sharing based on Blockchain

A El-Kosairy, N Abdelbaki, H Aslan - Advances in Computational …, 2023 - Springer
In recent years, cyber security attacks have increased massively. This introduces the need to
defend against such attacks. Cyber security threat intelligence has recently been introduced …

Blockchain security threats and collaborative defense: A literature review

X Li, J Cheng, Z Shi, J Liu, B Zhang, X Xu, X Tang… - 2023 - ttu-ir.tdl.org
As a distributed database, the system security of the blockchain is of great significance to
prevent tampering, protect privacy, prevent double spending, and improve credibility. Due to …

A protection system against HTTP flood attacks using software defined networking

DSM Gonçalves, RS Couto, MG Rubinstein - Journal of Network and …, 2023 - Springer
Abstract HyperText Transfer Protocol (HTTP) Flood Distributed Denial-of-Service attacks use
a set of infected nodes in a botnet to overload a web server. This article proposes a …