Threat modeling–A systematic literature review

W Xiong, R Lagerström - Computers & security, 2019 - Elsevier
Cyber security is attracting worldwide attention. With attacks being more and more common
and often successful, no one is spared today. Threat modeling is proposed as a solution for …

A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

R Meng, B Xu, X Xu, M Sun, B Wang, S Han… - Journal of Network and …, 2024 - Elsevier
To ensure secure and reliable communication in wireless systems, authenticating the
identities of numerous nodes is imperative. Traditional cryptography-based authentication …

Intrusion detection system using deep learning for in-vehicle security

J Zhang, F Li, H Zhang, R Li, Y Li - Ad Hoc Networks, 2019 - Elsevier
With the development of vehicle intelligence technology, the combination of network and
vehicle becomes inevitable, which brings much convenience to people. At the same time …

A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position

J Liang, J Chen, Y Zhu, R Yu - Applied Soft Computing, 2019 - Elsevier
Vehicle ad hoc networks (VANETs) have attracted great interests from both industry and
academia, but a number of issues, particularly security, have not been readily addressed …

A range-based secure localization algorithm for wireless sensor networks

X Liu, S Su, F Han, Y Liu, Z Pan - IEEE Sensors Journal, 2018 - ieeexplore.ieee.org
The accurate localization of nodes in wireless sensor networks can be jeopardized in certain
applications of fields, such as those in security and military. In order to detect the nodes that …

Secure location of things (SLOT): Mitigating localization spoofing attacks in the Internet of Things

P Zhang, SG Nagarajan, I Nevat - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
The rise of geo-spatial location-based applications for the Internet of Things introduces new
location spoofing security risks. To overcome the threat of malicious spoofing attacks, we …

Support vector machine (svm) based sybil attack detection in vehicular networks

P Gu, R Khatoun, Y Begriche… - 2017 IEEE wireless …, 2017 - ieeexplore.ieee.org
Vehicular networks have been drawing special atten-tion in recent years, due to its
importance in enhancing driving experience and improving road safety in future smart city. In …

A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology

J Liang, M Ma, M Sadiq, KH Yeung - Knowledge-Based Systems, 2019 - Elsevier
Abstract Although Vehicle Ad Hoc Network (VANETs) as a new technology is being used in
wide range of applications to improve the driving experience as well as safety, it is …

Cybersecurity measures for geocasting in vehicular cyber physical system environments

S Kumar, U Dohare, K Kumar, DP Dora… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Geocasting in vehicular communication has witnessed significant attention due to the
benefits of location oriented information dissemination in vehicular traffic environments …

Geo-spatial location spoofing detection for Internet of Things

JY Koh, I Nevat, D Leong… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-
based services in the Internet of Things (IoT), called enhanced location spoofing detection …