[go: up one dir, main page]

Doan et al., 2023 - Google Patents

Threat modeling for ML-based topology prediction in vehicular edge computing architecture

Doan et al., 2023

View PDF
Document ID
1580406557129014895
Author
Doan H
Paul A
Zeindlinger H
Zhang Y
Khan S
Svetinovic D
Publication year
Publication venue
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)

External Links

Snippet

The Internet of Vehicles (IoV), a network that interlinks vehicles, infrastructure, and assorted entities, serves as a cornerstone for intelligent transportation systems and the emergence of smart cities. Within this context, edge computing has been identified as a critical solution for …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]

Similar Documents

Publication Publication Date Title
Banerjee et al. A blockchain future for internet of things security: a position paper
Rani et al. Threats and corrective measures for IoT security with observance of cybercrime: A survey
Razzaq et al. Security issues in the Internet of Things (IoT): A comprehensive study
Nazir et al. Survey on wireless network security
Ijaz et al. Smart cities: A survey on security concerns
US9215244B2 (en) Context aware network security monitoring for threat detection
EP2929666B1 (en) Context aware network security monitoring for threat detection
Guerber et al. Machine Learning and Software Defined Network to secure communications in a swarm of drones
Harvey et al. A survey of intelligent transportation systems security: challenges and solutions
Mallick et al. Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments
Mogadem et al. A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Almrezeq et al. Design a secure IoT architecture using smart wireless networks
Ahmad et al. A novel context-based risk assessment approach in vehicular networks
Yao et al. A novel security framework for edge computing based uav delivery system
Bhuvaneshwari et al. A review of deep learning strategies for enhancing cybersecurity in networks: Deep learning strategies for enhancing cybersecurity
Neu et al. An approach for detecting encrypted insider attacks on OpenFlow SDN Networks
Valadares et al. Security challenges and recommendations in 5G-IoT scenarios
Deng et al. A Survey on Vehicular Cloud Network Security
Singh et al. Security and privacy aspect of cyber physical systems
Doan et al. Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture
Mishra et al. Cloud and big data security system’s review principles: A decisive investigation
Kumar et al. A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications
Athavale et al. Framework for threat analysis and attack modelling of network security protocols
Kishore et al. Intrusion Detection System a Need
Rattanalerdnusorn et al. IoTDePT: Detecting security threats and pinpointing anomalies in an IoT environment