Decentralized identity verification system for data access to prevent data exfiltration ransomware

K Takeuchi, T Kumamoto, Y Yoshida, H Fujima - Authorea Preprints, 2023 - techrxiv.org
The escalating sophistication of ransomware has catalyzed the transition from traditional
encryption-focused attacks to more pernicious data exfiltration techniques. This research …

Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

Augmented IoT cooperative vehicular framework based on distributed deep blockchain networks

A Lakhan, MA Mohammed, DA Zebari… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This article presents the Augmented Internet of Things (AIoT) framework for cooperatively
distributed deep blockchain-assisted vehicle networks. AIoT framework splits the vehicle …

BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles

BA Tanaji, S Roychowdhury - Applied soft computing, 2024 - Elsevier
Connected and autonomous vehicles (CAVs) have gained significant importance in
intelligent transportation systems. However, CAVs are associated with significant cyber-risks …

[PDF][PDF] The crowdstrike incident: Analysis and unveiling the intricacies of modern cybersecurity breaches

I Naseer - World Journal of Advanced Engineering Technology …, 2024 - researchgate.net
The CrowdStrike incident is also helpful in evaluating the understanding of who is defending
from cyber-attacks and what methods are being used. This pen works on the deep …

Analysis of barriers for adopting blockchain in agri-food supply chain management: a decision support framework

N Virmani, RK Singh - International Journal of Quality & Reliability …, 2024 - emerald.com
Purpose Integrating digital technologies such as artificial intelligence and blockchain make
the agri-food supply chain (ASCM) transparent, resilient and flexible. However, its adoption …

Investigation of Security Threat Datasets for Intra-and Inter-Vehicular Environments

A Haddaji, S Ayed, L Chaari Fourati… - Sensors, 2024 - mdpi.com
Vehicular networks have become a critical component of modern transportation systems by
facilitating communication between vehicles and infrastructure. Nonetheless, the security of …

Sybil attacks detection and traceability mechanism based on beacon packets in connected automobile vehicles

Y Zhu, J Zeng, F Weng, D Han, Y Yang, X Li, Y Zhang - Sensors, 2024 - mdpi.com
Connected Automobile Vehicles (CAVs) enable cooperative driving and traffic management
by sharing traffic information between them and other vehicles and infrastructures. However …

Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology

C Swamynathan, R Shanmugam… - Transactions on …, 2024 - Wiley Online Library
Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary
concept with enormous potential for develo** safe and efficient transportation systems …