Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey

M Dibaei, X Zheng, Y Xia, X Xu, A Jolfaei… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With recent developments in communication technologies, vehicular networks have become
a reality with various applications. However, the cybersecurity aspect of vehicular networks …

LITNET-2020: An annotated real-world network flow dataset for network intrusion detection

R Damasevicius, A Venckauskas, S Grigaliunas… - Electronics, 2020 - mdpi.com
Network intrusion detection is one of the main problems in ensuring the security of modern
computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In …

Fuzzy logic based unequal clustering for wireless sensor networks

R Logambigai, A Kannan - Wireless Networks, 2016 - Springer
The primary challenges in outlining and arranging the operations of wireless sensor
networks are to enhance energy utilization and the system lifetime. Clustering is a powerful …

[HTML][HTML] Botnet detection using graph-based feature clustering

S Chowdhury, M Khanzadeh, R Akula, F Zhang… - Journal of Big Data, 2017 - Springer
Detecting botnets in a network is crucial because bots impact numerous areas such as cyber
security, finance, health care, law enforcement, and more. Botnets are becoming more …

Software-defined networking security: pros and cons

M Dabbagh, B Hamdaoui, M Guizani… - IEEE Communications …, 2015 - ieeexplore.ieee.org
Software-defined networking (SDN) is a new networking paradigm that decouples the
forwarding and control planes, traditionally coupled with one another, while adopting a …

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

H Sedjelmaci, SM Senouci - Computers & Electrical Engineering, 2015 - Elsevier
The advancement of wireless communication leads researchers to develop and conceive
the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security …

Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

An effect of big data technology with ant colony optimization based routing in vehicular ad hoc networks: Towards smart cities

SK Lakshmanaprabu, K Shankar, SS Rani… - Journal of cleaner …, 2019 - Elsevier
Rapid growth in urban population creates various kinds of issues like long hours traffic-jams,
pollution which makes the city life insecure and non-liveable. The concept of a smart city is …