Interest flooding attacks in named data networking: Survey of existing solutions, open issues, requirements, and future directions

A Benmoussa, CA Kerrache, N Lagraa… - ACM Computing …, 2022 - dl.acm.org
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric
Networking. The NDN architecture adopts name-based routing and location-independent …

[HTML][HTML] A survey on security attacks and intrusion detection mechanisms in named data networking

A Hidouri, N Hajlaoui, H Touati, M Hadded… - Computers, 2022 - mdpi.com
Despite the highly secure content sharing and the optimized forwarding mechanism, the
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …

Simultaneous benefit maximization of conflicting opinions: Modeling and analysis

LX Yang, P Li, X Yang, Y Xiang… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
There are a multitude of opinions that are popular in online social networks (OSNs).
Typically, an opinion creator attempts to push his opinion to OSN users to gain the maximum …

[HTML][HTML] An edge IDS based on biological immune principles for dynamic threat detection

Y Zhang, J Wei, K Wang - Wireless Communications and Mobile …, 2020 - hindawi.com
Edge computing solves such questions as the massive multisource data and resource
consuming computing tasks in edge devices. Some new security problems especially the …

Characterizing the Multicast Nature of Malicious Flows in CCN via SIS Epidemic Model

W Yang, Y Qin, Y Yang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
Content-centric networking (CCN) should provide enhanced protection over current network.
However, it is still threatened by malicious attackers. This article analyzes the influence of …

Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking

VJ Babu, MV Jose - International Journal of Information Technology, 2023 - Springer
Network caching in named data networks (NDN) is essential for improving the potentialities
of the conventional IP networking. The concept of network caching is necessary for …

Variance of the Infection Number of Heterogeneous Malware Spread in Network

D Guo, L Jiao, J Jiao, K Meng - Applied Sciences, 2024 - mdpi.com
The Susceptible–Infected–Susceptible (SIS) model in complex networks is one of the critical
models employed in the modeling of virus spread. The study of the heterogeneous SIS …

Control Strategies for Switching SIS Epidemic Models with Multiple Equilibrium Points

K Wang, L Zhu - … on Machine Learning, Control, and Robotics …, 2023 - ieeexplore.ieee.org
This paper studies a class of hybrid susceptible-infective-susceptible (SIS) epidemic models
in the constant total population in the form of switched systems with multiple equilibria. First …