Acceso abierto

ReliefF-RF model application in communication security risk detection of distribution network


Cite

Priyadarsini, M., Bera, P., Das, S. K., Rahman, M. A. (2022). A security enforcement framework for SDN controller using game theoretic approach. IEEE Transactions on Dependable and Secure Computing, 20(2): 1500-1515. Search in Google Scholar

Ren, J., Li, J., Liu, H., Qin, T. (2021). Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Science and Technology, 27(4): 760-776. Search in Google Scholar

Glavan, A,. Gheorghica, D., Croitoru, V. (2023). Multi-access edge computing analysis of risks and security measures. Revue roumaine des sciences techniques—série électrotechnique et énergétique, 68(2): 206-211. Search in Google Scholar

Malkawi, R., Alsmadi, I., Aleroud, A. (2021). A firewall-adversarial testing approach for software defined networks. Journal of Theoretical and Applied Information Technology, 99(1): 227-241. Search in Google Scholar

Häckel, T., Meyer, P., Korf, F., Schmidt, T. (2022). Secure time-sensitive software-defined networking in vehicles. IEEE Transactions on Vehicular Technology, 72(1): 35-51. Search in Google Scholar

Aonzo, E., Neri, A. (2020). RESISTO: Resilience Enhancement and Risk Control Platform for Communications Infrastructure Operators. POLARIS Innovation Journal, (41): 13-15. Search in Google Scholar

Umar, R., Riadi, I., Kusuma, R. S. (2021). Mitigating sodinokibi ransomware attack on cloud network using software-defined networking (SDN). International Journal of Safety and Security Engineering, 11(3): 239-246. Search in Google Scholar

Benzaïd, C., Taleb, T., Farooqi, M. Z. (2021). Trust in 5G and beyond networks. IEEE Network, 35(3): 212-222. Search in Google Scholar

Ghimire, B., Rawat, D. B., Liu, C. (2021). Sharding-enabled blockchain for software-defined internet of unmanned vehicles in the battlefield. IEEE Network, 35(1): 101-107. Search in Google Scholar

Srivastava, V., Pandey, R. S. (2022). Load balancing for software-defined network: a review. International Journal of Computers and Applications, 44(8): 746-759. Search in Google Scholar

Abed, A. S., Khalil, B., Ibrahim, S. I., McAndrew, L. (2022). Development of an Integrate E-Medical System Using Software Defined Networking and Machine Learning. Webology, 19(1): 3410-8. Search in Google Scholar

Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10): 10250-10276. Search in Google Scholar

Batista, E., Figueiredo, G., Prazeres, C. (2022). Load balancing between fog and cloud in fog of things based platforms through software-defined networking. Journal of King Saud University-Computer and Information Sciences, 34(9): 7111-7125. Search in Google Scholar

AbdelAzim, N. M., Fahmy, S. F., Sobh, M. A., Eldin, A. S. (2021). A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism. Egyptian Informatics Journal, 22(1): 85-90. Search in Google Scholar

Bhayo, J., Jafaq, R., Ahmed, A., Hameed, S., Shah, S. A. (2021). A time-efficient approach toward DDoS attack detection in IoT network using SDN. IEEE Internet of Things Journal, 9(5): 3612-3630. Search in Google Scholar

Shrestha, B., Lin, H. (2020). Data-centric edge computing to defend power grids against IoT-based attacks. Computer, 53(5): 35-43. Search in Google Scholar

John, S. J., Suma, P., Athira, T. M. (2022). Multiset modules. Journal of Computational and Cognitive Engineering, 1(1): 37-41. Search in Google Scholar

Sarkar, A., Biswas, A., Kundu, M. (2022). Development of q-Rung Orthopair Trapezoidal Fuzzy Einstein Aggregation Operators and Their Application in MCGDM Problems. Journal of Computational and Cognitive Engineering, 1(3): 109-121. Search in Google Scholar

Zaminkar, M., Fotohi, R. (2020). SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wireless Personal Communications, 114(2): 1287-1312. Search in Google Scholar

eISSN:
2444-8656
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics