A novel trust-based security and privacy model for internet of vehicles using encryption and steganography

MS Rathore, M Poongodi, P Saurabh… - Computers and …, 2022 - Elsevier
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …

Global cryptocurrency trend prediction using social media

M Poongodi, TN Nguyen, M Hamdi, K Cengiz - Information Processing & …, 2021 - Elsevier
This paper aims to investigate the global crypto-currency price movement trends with
respect to the social media communication data. The idea is to analyze the topical trends in …

[HTML][HTML] Peer-to-peer trust management in intelligent transportation system: An Aumann's agreement theorem based approach

TR Ramesh, M Vijayaragavan, M Poongodi, M Hamdi… - ICT Express, 2022 - Elsevier
Vehicular ad hoc network (VANETs) has gained wide popularity such that it is necessary to
incorporate trust among each node in the network. However, trust management among …

Autonomous transaction model for e-commerce management using blockchain technology

S Sekar, A Solayappan, J Srimathi, S Raja… - International Journal of …, 2022 - igi-global.com
A blockchain is an advanced technology that can power over a decentralized network. The
authors bring it up to design the autonomous transaction system for e-commerce …

Social network user profiling with multilayer semantic modeling using ego network

K Balasubramaniam, S Vidhya… - International Journal of …, 2022 - igi-global.com
Social and information networks undermine the real relationship between the individuals
(ego) and the friends (alters) they are connected with on social media. The structure of …

Social network analysis for precise friend suggestion for twitter by associating multiple networks using ml

DKS Singh, N Nithya, L Rahunathan… - International Journal of …, 2022 - igi-global.com
The main aim in this paper is to create a friend suggestion algorithm that can be used to
recommend new friends to a user on Twitter when their existing friends and other details are …

A survey on the current security landscape of intelligent transportation systems

A Lamssaggad, N Benamar, AS Hafid, M Msahli - IEEE Access, 2021 - ieeexplore.ieee.org
With the proliferation of embedded technologies and wireless capabilities, today's vehicles
are no longer isolated mechanical machines. They become part of a hyper-connected …

Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques

AA AlZubi, M Al-Maitah, A Alarifi - Soft Computing, 2021 - Springer
Cyber-physical systems have been extensively utilized in healthcare domains to deliver high-
quality patient treatment in multifaceted clinical scenarios. The medical device'heterogeneity …

Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics

SS Mohar, S Goyal, R Kaur - The Journal of Supercomputing, 2022 - Springer
Wireless sensor networks (WSNs) contain sensor nodes in enormous amount to accumulate
the information about the nearby surroundings, and this information is insignificant until the …

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …