D Soni, N Kumar - Journal of Network and Computer Applications, 2022 - Elsevier
Cloud computing offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to provide compute, network, and storage capabilities to the …
Y Zhong, L Chen, C Dan, A Rezaeipanah - The Journal of …, 2022 - Springer
Abstract The Internet of Things (IoT) is an emerging paradigm that offers remarkable opportunities for data mining and analysis. IoT envisions a world where all smartphones …
R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
P Kumar, GP Gupta, R Tripathi - Arabian Journal for Science and …, 2021 - Springer
With simple connectivity and fast-growing demand of smart devices and networks, IoT has become more prone to cyber attacks. In order to detect and prevent cyber attacks in IoT …
Internet of Things is shaping the quality of living standard. With the rapid growth and expansion of adopting IoT-based approaches, their security represents a growing challenge …
The significance of an intrusion detection system (IDS) in networks security cannot be overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
A Kumar, D Singh - International Journal of Information Technology, 2024 - Springer
The limited resource and computation capacity of an IoT device always being a target vector for intruders to use to steal sensitive data from the device. Computational problems were …
R Sharma, N Sharma - International Journal of Software Science and …, 2022 - igi-global.com
An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm …
Abstract The Internet-of-Things (IoT) relies on the TCP protocol to transport data from a source to a destination. Making it vulnerable to DDoS using the TCP SYN attack on Cyber …