Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 260594, 13 pages
http://dx.doi.org/10.1155/2015/260594
Research Article

EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network

1National University of Sciences and Technology, Islamabad 44000, Pakistan
2King Saud University, Riyadh 11451, Saudi Arabia

Received 12 May 2015; Accepted 9 August 2015

Academic Editor: Basit Shahzad

Copyright © 2015 Rabia Latif et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [10 citations]

The following is the list of published articles that have cited the current article.

  • Kashif Saleem, Haider Abbas, Jalal Al-Muhtadi, Mehmet A. Orgun, Rajan Shankaran, and Guanglou Zhang, “Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform,” 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops), pp. 236–240, . View at Publisher · View at Google Scholar
  • Rabia Latif, Haider Abbas, Seemab Latif, and Ashraf Masood, “Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment,” Journal of Medical Systems, vol. 40, no. 7, 2016. View at Publisher · View at Google Scholar
  • Haider Abbas, Rabia Latif, Seemab Latif, and Ashraf Masood, “Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems,” Annals of Telecommunications, 2016. View at Publisher · View at Google Scholar
  • Muhammad Umair Aslam, Abdelouahid Derhab, Mehmet Orgun, Waseem Iqbal, Baber Aslam, Kashif Saleem, and Haider Abbas, “A Survey of Authentication Schemes in Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 41, no. 1, 2017. View at Publisher · View at Google Scholar
  • Farrukh Aslam Khan, Afsheen Ahmed, Rabia Latif, Seemab Latif, and Haider Abbas, “Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review,” Multimedia Tools and Applications, vol. 77, no. 17, pp. 21947–21965, 2018. View at Publisher · View at Google Scholar
  • Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, and Yanxiang Guo, “A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence,” The Computer Journal, 2018. View at Publisher · View at Google Scholar
  • Wang Junzheng, and Wang Chao, “Cloud-service decision tree classification for education platform,” Cognitive Systems Research, vol. 52, pp. 234–239, 2018. View at Publisher · View at Google Scholar
  • Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, and Wei Guo, “Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing,” Security and Communication Networks, vol. 2018, pp. 1–14, 2018. View at Publisher · View at Google Scholar
  • Xin Liu, Yanju Zhou, and Xiaohong Chen, “Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases,” Complexity, vol. 2018, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  • A. Vanitha Katherine, Kamalavalli, Vinothini, Mohan Jagannath, and Jayanthi, “Modern Very Fast Decision Tree model for mining high-speed time-series data stream,” International Journal of Engineering and Technology(UAE), vol. 7, no. 4, pp. 492–496, 2018. View at Publisher · View at Google Scholar