Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …
increase in the network size and the corresponding data. As a result, many novel attacks are …
A comprehensive survey on the applications of blockchain for securing vehicular networks
Vehicular networks promise features such as traffic management, route scheduling, data
exchange, entertainment, and much more. With any large-scale technological integration …
exchange, entertainment, and much more. With any large-scale technological integration …
A comprehensive survey on vehicular networking: Communications, applications, challenges, and upcoming research directions
Nowadays, advanced communication technologies are being utilized to develop intelligent
transportation management and driving assistance. Through the ability to exchange traffic …
transportation management and driving assistance. Through the ability to exchange traffic …
Secure and efficient blockchain-assisted authentication for edge-integrated Internet-of-Vehicles
Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
Thanks to the rapidly develo** technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …
complete a number of tasks in cooperation with each other without need for human …
Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles
A Rehman Javed, Z Jalil… - Transactions on …, 2022 - Wiley Online Library
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled
connected vehicles to work together to accomplish complex jobs that they are unable to …
connected vehicles to work together to accomplish complex jobs that they are unable to …
Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
Secure operations of connected and autonomous vehicles
J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
AIT: An AI-enabled trust management system for vehicular networks using blockchain technology
Currently, connected vehicles have gradually stepped into our daily lives, and they generally
rely on vehicular networks to generate and exchange traffic-related messages to improve …
rely on vehicular networks to generate and exchange traffic-related messages to improve …