A novel trust-based security and privacy model for internet of vehicles using encryption and steganography
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …
Global cryptocurrency trend prediction using social media
This paper aims to investigate the global crypto-currency price movement trends with
respect to the social media communication data. The idea is to analyze the topical trends in …
respect to the social media communication data. The idea is to analyze the topical trends in …
[HTML][HTML] Peer-to-peer trust management in intelligent transportation system: An Aumann's agreement theorem based approach
Vehicular ad hoc network (VANETs) has gained wide popularity such that it is necessary to
incorporate trust among each node in the network. However, trust management among …
incorporate trust among each node in the network. However, trust management among …
Autonomous transaction model for e-commerce management using blockchain technology
A blockchain is an advanced technology that can power over a decentralized network. The
authors bring it up to design the autonomous transaction system for e-commerce …
authors bring it up to design the autonomous transaction system for e-commerce …
Social network user profiling with multilayer semantic modeling using ego network
Social and information networks undermine the real relationship between the individuals
(ego) and the friends (alters) they are connected with on social media. The structure of …
(ego) and the friends (alters) they are connected with on social media. The structure of …
Social network analysis for precise friend suggestion for twitter by associating multiple networks using ml
The main aim in this paper is to create a friend suggestion algorithm that can be used to
recommend new friends to a user on Twitter when their existing friends and other details are …
recommend new friends to a user on Twitter when their existing friends and other details are …
A survey on the current security landscape of intelligent transportation systems
With the proliferation of embedded technologies and wireless capabilities, today's vehicles
are no longer isolated mechanical machines. They become part of a hyper-connected …
are no longer isolated mechanical machines. They become part of a hyper-connected …
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
Cyber-physical systems have been extensively utilized in healthcare domains to deliver high-
quality patient treatment in multifaceted clinical scenarios. The medical device'heterogeneity …
quality patient treatment in multifaceted clinical scenarios. The medical device'heterogeneity …
Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics
Wireless sensor networks (WSNs) contain sensor nodes in enormous amount to accumulate
the information about the nearby surroundings, and this information is insignificant until the …
the information about the nearby surroundings, and this information is insignificant until the …
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …
it a destructive weapon of attackers which can disrupt the services of any network including …