Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 10 publications
0
16
0
1
Order By: Relevance
“…Krishnan et al [70] introduce a distributed and hierarchical architecture for large-scale networks, consisting of four (4) layers, namely: (i) Cloud; (ii) Edge; (iii) SDN; and (iv) IoT. High-level management is conducted from the cloud layer, which defines security policies and forwards them to the edge layer.…”
Section: Moving Target Defense-mtdmentioning
confidence: 99%
See 2 more Smart Citations
“…Krishnan et al [70] introduce a distributed and hierarchical architecture for large-scale networks, consisting of four (4) layers, namely: (i) Cloud; (ii) Edge; (iii) SDN; and (iv) IoT. High-level management is conducted from the cloud layer, which defines security policies and forwards them to the edge layer.…”
Section: Moving Target Defense-mtdmentioning
confidence: 99%
“…Bhunia and Gurusamy [25] Nguyen et al [58] Rathore et al [59] MTD Krishnan et al [70] Rate limiting Honeypots Yan et al [42] Hybrid SDN-Blockchain Traffic filtering Houda et al [66] The definition of the comparison parameter featuring Table 3 is highlighted in the enumeration outlines below:…”
Section: Flow Filteringmentioning
confidence: 99%
See 1 more Smart Citation
“…To cope with these pressing security, trust and operational assurance issues, adopting Deep Learning mechanisms that can be orchestrated through the SDN control plane, seems an ideal solution: It can leverage the capabilities of the IoT edge devices, without requiring any additional processing requirements, while providing the necessary scalability envisioned in such environments [17]. SDN centralized control intelligence [18] can provide a flexible, easily configurable and thorough IoT management due to the separation of the fronthaul/backhaul control and data planes [19].…”
Section: Introductionmentioning
confidence: 99%
“…In our previous articles, we started working in this context by experimenting different design choices and case studies to protect devices inside a particular network (eg, IoT network and virtualized cloud network), exploiting some NIDS algorithms and attack classifiers to realize a prototype framework. We obtained encouraging results from tests carried out on a small data set with simple features.…”
Section: Introductionmentioning
confidence: 99%