1267  | 0.923 | Lawall M.A.; Shaikh R.A.; Hassan S.R. | A Ddos Attack Mitigation Framework For Iot Networks Using Fog Computing | Procedia Computer Science, 182 (2021) |
33934  | 0.91 | Shukla P.; Krishna C.R.; Patil N.V. | Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive Review | Journal of Supercomputing, 80, 7 (2024) |
15037  | 0.893 | Abinaya M.; Prabakeran S.; Kalpana M. | Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment | 2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023 (2023) |
30623  | 0.892 | Bamou A.; Khardioui M.; El Ouadghiri M.D.; Aghoutane B. | Implementing And Evaluating An Intrusion Detection System For Denial Of Service Attacks In Iot Environments | Lecture Notes in Networks and Systems, 92 (2020) |
17576  | 0.886 | Nirosha V.; Hemamalini V. | Ddos Attack Detection System For Iot Enabled Smart City Applications With Correlation Analysis | 2024 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024 (2024) |
5530  | 0.883 | Dantas Silva F.S.; Silva E.; Neto E.P.; Lemos M.; Venancio Neto A.J.; Esposito F. | A Taxonomy Of Ddos Attack Mitigation Approaches Featured By Sdn Technologies In Iot Scenarios | Sensors (Switzerland), 20, 11 (2020) |
19189  | 0.882 | Alzahrani M.A.; Alzahrani A.M.; Siddiqui M.S. | Detecting Ddos Attacks In Iot-Based Networks Using Matrix Profile | Applied Sciences (Switzerland), 12, 16 (2022) |
11011  | 0.878 | Binu P.K.; Kiran M.; Sreehari M.V. | Attack And Anomaly Prediction In Iot Networks Using Machine Learning Approaches | 2021 4th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2021 (2021) |
17581  | 0.876 | Rajan D.M.; Sathya Priya S. | Ddos Mitigation Techniques In Iot: A Survey | 2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022) |
19238  | 0.874 | Thiruppathi K.; Jaidhar C.D. | Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling Techniques | Communications in Computer and Information Science, 2333 CCIS (2025) |