A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud
暂无分享,去创建一个
Jianhua Liu | Minglu Li | Xin Wang | Shui Yu | Shigen Shen | Guangxue Yue | Minglu Li | Guangxue Yue | Shigen Shen | Jianhua Liu | Shui Yu | Xin Wang
[1] Hongbo Zhu,et al. Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things , 2016, IEEE Internet of Things Journal.
[2] Vijay Varadharajan,et al. Counteracting security attacks in virtual machines in the cloud using property based attestation , 2014, J. Netw. Comput. Appl..
[3] S. Mercy Shalinie,et al. Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.
[4] Qun Li,et al. A Survey of Virtual Machine Management in Edge Computing , 2019, Proceedings of the IEEE.
[5] Shui Yu,et al. Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.
[6] Xiangjian He,et al. A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks , 2018, IEEE Access.
[7] Pramod K. Varshney,et al. Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.
[8] Qinghe Du,et al. Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network , 2021, IEEE Transactions on Industrial Informatics.
[9] Yunlong Cai,et al. Latency Optimization for Resource Allocation in Mobile-Edge Computation Offloading , 2017, IEEE Transactions on Wireless Communications.
[10] Athanasios V. Vasilakos,et al. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[11] Katinka Wolter,et al. A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks , 2018, Pervasive Mob. Comput..
[12] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .
[13] Anthony T. Chronopoulos,et al. Game-theoretic static load balancing for distributed systems , 2011, J. Parallel Distributed Comput..
[14] Jianhua Liu,et al. Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.
[15] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[16] Zheng Chang,et al. Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint , 2019, IEEE Internet of Things Journal.
[17] Michael Mitzenmacher,et al. The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..
[18] Neha Agrawal,et al. Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges , 2019, IEEE Communications Surveys & Tutorials.
[19] Feng Wu,et al. A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.
[20] Mohammadreza Soltanaghaei,et al. A Novel Distributed Denial of Service (DDoS) Detection Method in Software Defined Networks , 2020 .
[21] Arwa Alrawais,et al. FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks , 2020, IEEE Internet of Things Journal.
[22] Muttukrishnan Rajarajan,et al. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.
[23] Tetsutaro Uehara,et al. Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[24] Thomas Bauschert,et al. Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-Learning Based Defense Framework , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[25] H. Vincent Poor,et al. Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[26] Abdullah Konak,et al. A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..
[27] Mahesan Niranjan,et al. On-line Q-learning using connectionist systems , 1994 .
[28] James Gross,et al. Statistical guarantee optimization for age of information for the D/G/1 queue , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[29] Peng Ning,et al. Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[30] Dan Liu,et al. A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.
[31] Weizhe Zhang,et al. Resource allocation and computation offloading with data security for mobile edge computing , 2019, Future Gener. Comput. Syst..
[32] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[33] Xin Liu,et al. Adaptive Learning-Based Task Offloading for Vehicular Edge Computing Systems , 2019, IEEE Transactions on Vehicular Technology.
[34] Hongjie Li,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..
[35] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[36] Yasir Faheem,et al. A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based Software Defined Networks in Smart Grids , 2019, IEEE Access.
[37] Kun Wang,et al. An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.
[38] Sabu M. Thampi,et al. Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things , 2019, Pervasive Mob. Comput..
[39] Ren-Hung Hwang,et al. MECPASS: Distributed Denial of Service Defense Architecture for Mobile Networks , 2018, IEEE Network.
[40] Yung-Liang Lai. Analyzing strategies of mobile agents on malicious cloud platform with Agent-Based Computational Economic Approach , 2013, Expert Syst. Appl..
[41] Manoj Singh Gaur,et al. DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2015, Comput. Commun..
[42] Sheng Zhong,et al. A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems , 2016, IEEE Transactions on Information Forensics and Security.
[43] Dimitrios P. Pezaros,et al. Per-Host DDoS Mitigation by Direct-Control Reinforcement Learning , 2020, IEEE Transactions on Network and Service Management.
[44] F. Richard Yu,et al. A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.
[45] Yanjiao Chen,et al. Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools , 2020, IEEE/ACM Transactions on Networking.
[46] Setareh Maghsudi,et al. Computation Offloading and Activation of Mobile Edge Computing Servers: A Minority Game , 2017, IEEE Wireless Communications Letters.
[47] Shashank Gupta,et al. SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[48] Yueming Cai,et al. Dynamic Computation Offloading for Mobile Cloud Computing: A Stochastic Game-Theoretic Approach , 2019, IEEE Transactions on Mobile Computing.
[49] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[50] Zhi Zhou,et al. Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing , 2018, IEEE Transactions on Vehicular Technology.