All Stories

  1. A Lightweight Mitigation Approach for Addressing DDAO Attacks in RPL-based Internet of Things
  2. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
  3. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
  4. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  5. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  6. Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks
  7. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  8. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks
  9. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  10. Machine Learning Based Intrusion Detection Systems for IoT Applications
  11. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  12. Simulating Attacks for RPL and Generating Multi-class Dataset for Supervised Machine Learning
  13. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
  14. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  15. Analysis of Routing Attacks on RPL based 6LoWPAN Networks
  16. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
  17. Relay node placement in constrained environment
  18. An Obstacle-Resistant Relay Node Placement in Constrained Environment
  19. Relay node placement techniques in wireless sensor networks