Skip to main content

Showing 1–2 of 2 results for author: Benslimane, A

Searching in archive eess. Search in all archives.
.
  1. arXiv:2211.01772  [pdf, other

    eess.SY cs.GT

    Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach

    Authors: Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li

    Abstract: The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but also exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots offer a promising lightweight defense for actively protecting mobile Internet of things, particularly UAV networks. While previous research has primarily focused on honeypot sys… ▽ More

    Submitted 29 August, 2023; v1 submitted 28 October, 2022; originally announced November 2022.

    Comments: Accepted Aug. 28, 2023 by IEEE Transactions on Information Forensics & Security. arXiv admin note: text overlap with arXiv:2209.13815

  2. arXiv:2109.12543  [pdf, ps, other

    eess.SY

    SDN-based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach

    Authors: Jun Du, Chunxiao Jiang, Abderrahim Benslimane, Song Guo, Yong Ren

    Abstract: Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks. As responding, the hybrid edge and cloud computing (ECC) system has been expected as a promising solution to handle the increasing computational applications with low-latency and on-demand services of computation offloading, which requires new computin… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.