O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of …
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and …
M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
Distributed denial‐of‐service attack is a serious concern in this era of voluminous Internet world. The challenge is to find difference between distributed denial‐of‐service attack traffic …
Cloud computing has the capability of sharing and retrieving data, remote controlling from different locations, that is why many companies and organizations implement their …
Security is the biggest concern in adopting Internet of things technology. In particular, as the Internet of things spreads widely, cyber-attacks are likely to become an increasingly physical …
H Park, CK Nkuba, S Woo, H Lee - 2022 52nd Annual IEEE/IFIP …, 2022 - ieeexplore.ieee.org
Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technology used in billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to …
Cloud computing dominates all kinds of computing in the network due to the service- oriented and on-demand nature of the model. The customer uses a cloud model for fulfilling …
MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic …