2021
DOI: 10.1109/jiot.2020.3028652
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
21
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(23 citation statements)
references
References 24 publications
0
21
0
2
Order By: Relevance
“…They must also consider other factors (e.g., institutional, aesthetic, legal, and financial) to determine whether a particular project is safe and successfully implemented. Designers today are staffed with employees specialized in scientific fields, such as engineering, computer science, economics, and law, who, in addition to technical specialization, have a basic understanding of other sciences and the ability to work with other professionals because the implementation of these projects requires a high degree of interdisciplinarity, especially in the field of ensuring the infrastructure grid they cover [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…They must also consider other factors (e.g., institutional, aesthetic, legal, and financial) to determine whether a particular project is safe and successfully implemented. Designers today are staffed with employees specialized in scientific fields, such as engineering, computer science, economics, and law, who, in addition to technical specialization, have a basic understanding of other sciences and the ability to work with other professionals because the implementation of these projects requires a high degree of interdisciplinarity, especially in the field of ensuring the infrastructure grid they cover [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…To obtain more specific and complete information in the source domain, how to obtain a quantifiable distribution function is a key challenge. 11 To address the above problems, the following method based on orthogonal term family of domain to fit distribution function is adopt, which called link prediction based on domain fitting (SPDF). First, feature mapping and label mapping are performed on the fields of different dimensions and label categories to ensure that they are all in [−1 ,1].…”
Section: Introductionmentioning
confidence: 99%
“…Nesse contexto, os protocolos da camada de aplicação são responsáveis por efetuar a comunicação entre tais dispositivos, fornecendo interoperabilidade na interação humano-máquina e na comunicação entre máquinas [Borgiani et al 2021]. Existem diversos protocolos disponíveis na camada de aplicação da IoT, a saber: Advanced Message Queuing Protocol (AMQP), Hyper Text Transfer Protocol Secure (HTTP), Message Queuing Telemetry Transport (MQTT), MQTT Sensor Network (MQTT-SN), Data Distribution Service (DDS), Extensible Messaging and Presence Protocol (XMPP) e Constrained Application Protocol (CoAP).…”
Section: Introductionunclassified