Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art
P Sharma, J Gillanders - IEEE Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for shaping the future of transportation systems. CAV …
demonstrated significant potential for shaping the future of transportation systems. CAV …
A comprehensive survey and tutorial on smart vehicles: Emerging technologies, security issues, and solutions using machine learning
According to research, the vast majority of road accidents (90%) are the result of human
error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart …
error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart …
Retracted article: Optimized intelligent data management framework for a cyber-physical system for computational applications
A Alsufyani, Y Alotaibi, AO Almagrabi… - Complex & Intelligent …, 2023 - Springer
The Editor-in-Chief and the Publisher have retracted this article. The article was submitted to
be part of a guest-edited issue. An investigation by the Publisher found a number of articles …
be part of a guest-edited issue. An investigation by the Publisher found a number of articles …
Detection of fake replay attack signals on remote keyless controlled vehicles using pre-trained deep neural network
Q Abu Al-Haija, AA Alsulami - Electronics, 2022 - mdpi.com
Keyless systems have replaced the old-fashioned methods of inserting physical keys into
keyholes to unlock the door, which are inconvenient and easily exploited by threat actors …
keyholes to unlock the door, which are inconvenient and easily exploited by threat actors …
DBD: Deep learning DGA-based botnet detection
R Vinayakumar, KP Soman, P Poornachandran… - … learning applications for …, 2019 - Springer
Botnets play an important role in malware distribution and they are widely used for
spreading malicious activities in the Internet. The study of the literature shows that a large …
spreading malicious activities in the Internet. The study of the literature shows that a large …
[HTML][HTML] Securing smart vehicles from relay attacks using machine learning
Due to the rapid developments in intelligent transportation systems, modern vehicles have
turned into intelligent transportation means which are able to exchange data through various …
turned into intelligent transportation means which are able to exchange data through various …
SDN-assisted DDoS defense framework for the internet of multimedia things
The Internet of Things is visualized as a fundamental networking model that bridges the gap
between the cyber and real-world entity. Uniting the real-world object with virtualization …
between the cyber and real-world entity. Uniting the real-world object with virtualization …
Ultra-lightweight mutual authentication in the vehicle based on smart contract blockchain: Case of MITM attack
P Razmjouei, A Kavousi-Fard… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
For quite a long time, purchasers have come to depend on the convenience and security
and included security that a passive vehicle immobilizer framework offers. These …
and included security that a passive vehicle immobilizer framework offers. These …
[HTML][HTML] Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home
Human activity recognition has been a topic of attraction among researchers and developers
because of its enormous usage in widespread region of human life. The varied human …
because of its enormous usage in widespread region of human life. The varied human …
AI-assisted bio-inspired algorithm for secure IoT communication networks
Abstract The Internet of Things (IoT) is made up of intelligent devices that interact with each
other. It allows information to be gathered and shared by these devices. In addition, IoT now …
other. It allows information to be gathered and shared by these devices. In addition, IoT now …