1. Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol

M. Yadollahzadeh Tabari; Z. Mataji

Volume 9, Issue 1 , Winter 2021, , Pages 73-85

http://dx.doi.org/10.22044/jadm.2020.9253.2060

Abstract
  The Internet of Things (IoT) is a novel paradigm in computer networks which is capable to connect things to the internet via a wide range of technologies. Due to the features of the sensors used in IoT networks and the unsecured nature of the internet, IoT is vulnerable to many internal routing attacks. ...  Read More

G.3.5. Systems
2. Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

M. Rezvani

Volume 6, Issue 2 , Summer 2018, , Pages 387-397

http://dx.doi.org/10.22044/jadm.2017.5581.1668

Abstract
  Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional ...  Read More