Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks
暂无分享,去创建一个
[1] Laurence T. Yang,et al. A deep residual computation model for heterogeneous data learning in smart Internet of Things , 2021, Appl. Soft Comput..
[2] Samee U. Khan,et al. Quantifying cloud elasticity with container-based autoscaling , 2019, Future Gener. Comput. Syst..
[3] Jong Hyuk Park,et al. DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks , 2019, IEEE Network.
[4] Gopal K. Shyam,et al. An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment , 2021, Appl. Soft Comput..
[5] Uttam Ghosh,et al. A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT , 2023, IEEE Internet of Things Journal.
[6] Jong Hyuk Park,et al. CF-CloudOrch: container fog node-based cloud orchestration for IoT networks , 2018, The Journal of Supercomputing.
[7] Xin Fan,et al. Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT , 2019, Future Gener. Comput. Syst..
[8] Li Zhang,et al. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks , 2016, Neural Computing and Applications.
[9] Deqing Zou,et al. Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment , 2018, IEEE Transactions on Emerging Topics in Computing.
[10] Daejin Park,et al. On-Demand Remote Software Code Execution Unit Using On-Chip Flash Memory Cloudification for IoT Environment Acceleration , 2021, J. Inf. Process. Syst..
[11] Jong Hyuk Park,et al. A Comprehensive Analyses of Intrusion Detection System for IoT Environment , 2020, J. Inf. Process. Syst..
[12] Claudia Szabo,et al. An adaptive framework for the detection of novel botnets , 2018, Comput. Secur..
[13] Chu-Sing Yang,et al. Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices , 2019, Comput. Secur..
[14] Widyawan,et al. Two-Phase Security Protection for the Internet of Things Object , 2018, J. Inf. Process. Syst..
[15] Shailendra Rathore,et al. CIoT-Net: a scalable cognitive IoT based smart city network architecture , 2019, Human-centric Computing and Information Sciences.
[16] Ling Liu,et al. A Comparative Study of Containers and Virtual Machines in Big Data Environment , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).
[17] Neeraj Kumar,et al. An Energy-Efficient Cache Localization Technique for D2D Communication in IoT Environment , 2021, IEEE Internet of Things Journal.
[18] Jong Hyuk Park,et al. BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence , 2020, Future Gener. Comput. Syst..
[19] Yi Pan,et al. Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks , 2019, Symmetry.
[20] Sudhir Kumar,et al. Handling Device Heterogeneity and Orientation Using Multistage Regression for GMM Based Localization in IoT Networks , 2019, IEEE Access.
[21] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[22] Mikail Mohammed Salim,et al. A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions , 2021 .
[23] Shaohuai Shi,et al. Performance Evaluation of Deep Learning Tools in Docker Containers , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).
[24] Hai Anh Tran,et al. A LSTM based framework for handling multiclass imbalance in DGA botnet detection , 2018, Neurocomputing.
[25] Ali Dehghantanha,et al. BoTShark: A Deep Learning Approach for Botnet Traffic Detection , 2018 .
[26] Dong-Min Park,et al. S-mote: SMART Home Framework for Common Household Appliances in IoT Network , 2019, J. Inf. Process. Syst..
[27] Vincenzo Loia,et al. VPNFilter Malware Analysis on Cyber Threat in Smart Home Network , 2019, Applied Sciences.
[28] Yousaf Bin Zikria,et al. Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution , 2019, Sensors.
[29] Mamoun Alazab,et al. A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.
[30] Jose M. Alcaraz Calero,et al. Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks , 2019, J. Netw. Comput. Appl..
[31] Brij B. Gupta,et al. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.
[32] Dilip Kumar,et al. IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication , 2020, International Journal of Wireless Information Networks.
[33] Jong Hyuk Park,et al. Distributed denial of service attacks and its defenses in IoT: a survey , 2019, The Journal of Supercomputing.
[34] Jason C. Hung,et al. Feature selection with modified lion's algorithms and support vector machine for high-dimensional data , 2018, Appl. Soft Comput..
[35] Amir Masoud Rahmani,et al. Trust-based recommendation systems in Internet of Things: a systematic literature review , 2019, Human-centric Computing and Information Sciences.
[36] M. Carmen Fernández Gago,et al. A model-driven approach to ensure trust in the IoT , 2020, Hum. centric Comput. Inf. Sci..
[37] Qinghe Du,et al. Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network , 2021, IEEE Transactions on Industrial Informatics.
[38] Tassos Dimitriou,et al. Container Security: Issues, Challenges, and the Road Ahead , 2019, IEEE Access.