A Distributed Mitigation Strategy against DoS attacks in Edge Computing
暂无分享,去创建一个
[1] Juan-Carlos Cano,et al. TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks , 2017, 2017 Wireless Days.
[2] Abdon Serianni,et al. A two stages fuzzy logic approach for Internet of Things (IoT) wearable devices , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[3] Abdelouahed Zakari,et al. New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).
[4] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[5] Miroslav Voznák,et al. Effective Packet Loss Estimation on VoIP Jitter Buffer , 2012, Networking Workshops.
[6] Hakima Chaouchi,et al. Introduction to the Internet of Things , 2013 .
[7] Ion Bica,et al. Mitigating DoS attacks in publish-subscribe IoT networks , 2017, 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[8] Abdon Serianni,et al. A real IoT device deployment for e-Health applications under lightweight communication protocols, activity classifier and edge data filtering , 2018, Comput. Commun..
[9] Hannu Tenhunen,et al. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .
[10] P. Balamuralidhar,et al. Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[11] Robert John Walters,et al. Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..
[12] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[13] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[14] Floriano De Rango,et al. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..
[16] Floriano De Rango,et al. Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks , 2015, J. Networks.
[17] E. Mohammed,et al. Elliptic curve cryptosystems on smart cards , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[18] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[19] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .