Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT

[1]  Soumaya Cherkaoui,et al.  Context-Aware Adaptive Authentication and Authorization in Internet of Things , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[2]  Dong Zheng,et al.  Security and Privacy Challenges in 5G-Enabled Vehicular Networks , 2020, IEEE Network.

[3]  Ashraf Matrawy,et al.  Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[4]  C. Siva Ram Murthy,et al.  A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks , 2018, MSWiM.

[5]  Miaowen Wen,et al.  MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X , 2019, IEEE Communications Magazine.

[6]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[7]  Zibin Zheng,et al.  Tools and Benchmarks for Automated Log Parsing , 2018, 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).

[8]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[9]  Sabrina Sicari,et al.  5G In the internet of things era: An overview on security and privacy challenges , 2020, Comput. Networks.

[10]  Soumaya Cherkaoui,et al.  Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[11]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[12]  Hao Yue,et al.  RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[13]  Amiya Nayak,et al.  An improved network security situation assessment approach in software defined networks , 2019, Peer-to-Peer Netw. Appl..

[14]  Qi Shi,et al.  Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.