12424  | 0.952 | Shah Z.; Ullah I.; Li H.; Levula A.; Khurshid K. | Blockchain Based Solutions To Mitigate Distributed Denial Of Service (Ddos) Attacks In The Internet Of Things (Iot): A Survey | Sensors, 22, 3 (2022) |
5530  | 0.927 | Dantas Silva F.S.; Silva E.; Neto E.P.; Lemos M.; Venancio Neto A.J.; Esposito F. | A Taxonomy Of Ddos Attack Mitigation Approaches Featured By Sdn Technologies In Iot Scenarios | Sensors (Switzerland), 20, 11 (2020) |
14580  | 0.911 | El Houda Z.A.; Hafid A.; Khoukhi L. | Co-Iot: A Collaborative Ddos Mitigation Scheme In Iot Environment Based On Blockchain Using Sdn | Proceedings - IEEE Global Communications Conference, GLOBECOM (2019) |
33934  | 0.909 | Shukla P.; Krishna C.R.; Patil N.V. | Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive Review | Journal of Supercomputing, 80, 7 (2024) |
37141  | 0.897 | Brasilino L.R.B.; Swany M. | Mitigating Ddos Flooding Attacks Against Iot Using Custom Hardware Modules | 2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019 (2019) |
15037  | 0.886 | Abinaya M.; Prabakeran S.; Kalpana M. | Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment | 2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023 (2023) |
1267  | 0.884 | Lawall M.A.; Shaikh R.A.; Hassan S.R. | A Ddos Attack Mitigation Framework For Iot Networks Using Fog Computing | Procedia Computer Science, 182 (2021) |
17573  | 0.879 | Garuthman S.B.; Praveen Pai T. | Ddos Attack Detection And Prevention In A Smart City | 2024 4th International Conference on Multimedia Processing, Communication and Information Technology, MPCIT 2024 - Proceedings (2024) |
17578  | 0.876 | Dave S.; Degadwala S.; Vyas D. | Ddos Detection At Fog Layer In Internet Of Things | International Conference on Edge Computing and Applications, ICECAA 2022 - Proceedings (2022) |
19238  | 0.875 | Thiruppathi K.; Jaidhar C.D. | Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling Techniques | Communications in Computer and Information Science, 2333 CCIS (2025) |