Doan et al., 2023 - Google Patents
Threat modeling for ML-based topology prediction in vehicular edge computing architectureDoan et al., 2023
View PDF- Document ID
- 1580406557129014895
- Author
- Doan H
- Paul A
- Zeindlinger H
- Zhang Y
- Khan S
- Svetinovic D
- Publication year
- Publication venue
- 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
External Links
Snippet
The Internet of Vehicles (IoV), a network that interlinks vehicles, infrastructure, and assorted entities, serves as a cornerstone for intelligent transportation systems and the emergence of smart cities. Within this context, edge computing has been identified as a critical solution for …
- 238000010801 machine learning 0 abstract description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2823—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Banerjee et al. | A blockchain future for internet of things security: a position paper | |
Rani et al. | Threats and corrective measures for IoT security with observance of cybercrime: A survey | |
Razzaq et al. | Security issues in the Internet of Things (IoT): A comprehensive study | |
Nazir et al. | Survey on wireless network security | |
Ijaz et al. | Smart cities: A survey on security concerns | |
US9215244B2 (en) | Context aware network security monitoring for threat detection | |
EP2929666B1 (en) | Context aware network security monitoring for threat detection | |
Guerber et al. | Machine Learning and Software Defined Network to secure communications in a swarm of drones | |
Harvey et al. | A survey of intelligent transportation systems security: challenges and solutions | |
Mallick et al. | Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Almrezeq et al. | Design a secure IoT architecture using smart wireless networks | |
Ahmad et al. | A novel context-based risk assessment approach in vehicular networks | |
Yao et al. | A novel security framework for edge computing based uav delivery system | |
Bhuvaneshwari et al. | A review of deep learning strategies for enhancing cybersecurity in networks: Deep learning strategies for enhancing cybersecurity | |
Neu et al. | An approach for detecting encrypted insider attacks on OpenFlow SDN Networks | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
Deng et al. | A Survey on Vehicular Cloud Network Security | |
Singh et al. | Security and privacy aspect of cyber physical systems | |
Doan et al. | Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture | |
Mishra et al. | Cloud and big data security system’s review principles: A decisive investigation | |
Kumar et al. | A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications | |
Athavale et al. | Framework for threat analysis and attack modelling of network security protocols | |
Kishore et al. | Intrusion Detection System a Need | |
Rattanalerdnusorn et al. | IoTDePT: Detecting security threats and pinpointing anomalies in an IoT environment |