Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review

R Priyadarshi - Wireless Networks, 2024 - Springer
An industry-wide paradigm change has been sparked by the growth of Internet of Things
(IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective …

Simulative survey of flooding attacks in intermittently connected vehicular delay tolerant networks

W Khalid, N Ahmed, S Khan, Z Ullah, Y Javed - IEEE Access, 2023 - ieeexplore.ieee.org
Vehicular Adhoc Networks (VANETs) are an emerging and promising technology that
enables vehicles to communicate with roadside units (RSUs) and other vehicles. VANETs …

FAPMIC: Fake packet and selective packet drops attacks mitigation by Merkle hash tree in intermittently connected networks

W Khalid, N Ahmad, S Khan, NU Saquib… - IEEE …, 2023 - ieeexplore.ieee.org
Delay/Disruption Tolerant Networks (DTNs) are a special category of
IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent …

Exposed-mode of wormhole attack in opportunistic mobile networks: Impact study and analysis

S Aslam, A Altaweel, I Kamel - Proceedings of the 2023 European …, 2023 - dl.acm.org
Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities)
and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode …

Enhancing SQL Injection Prevention: Advanced Machine Learning and LSTM-Based Techniques

A Ghosh, S Diyasi, S Chatterjee - International …, 2024 - submissions.adroidjournals.com
A kind of cybercrime known as SQL injection lets attackers alter records by running bogus
SQL queries into an input field. This could result from more serious security breaches, illegal …

An extensive analysis of flying ad-hoc network applications and routing protocols in agriculture

A Ghosh, C Mistry, M Biswas - Artificial Intelligence Applications in …, 2022 - igi-global.com
Agriculture and irrigation are sources of man's potential. For the sake of cost-effectiveness
and the betterment of agricultural professionals, UAVs (unmanned aerial vehicles) can be …

[PDF][PDF] Spider Monkey Algorithm for Enhancing Security in Delay Tolerant Network

PK Gantayat, RG Tiwari - International Journal of Computing and …, 2023 - researchgate.net
Delay tolerant networks (DTNs) have recently emerged as the preferred method of
transmitting data to the destination node (DN). Furthermore, communications are sent …

[PDF][PDF] Analysis and Review of Transportation System Incorporating Real Time Vehicle Route Prediction and Travel Time Estimation Based on Heterogeneous …

S Chatterjee - 2025 - researchgate.net
Transport is one of the fascinating technology branches developed during the last 200 years
and time is the very precious demand in today's fast-moving life. Our current bus …

[PDF][PDF] Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks

Z ULLAH - researchgate.net
ABSTRACT Vehicular Adhoc Networks (VANETs) are an emerging and promising
technology that enables vehicles to communicate with roadside units (RSUs) and other …