Secure operations of connected and autonomous vehicles

J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …

A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

Binary improved white shark algorithm for intrusion detection systems

NA Alawad, BH Abed-alguni, MA Al-Betar… - Neural Computing and …, 2023 - Springer
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …

[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience

M Alazab, RA Khurma, M García-Arenas… - Egyptian Informatics …, 2024 - Elsevier
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …

Blockchain enabled intelligent digital forensics system for autonomous connected vehicles

R Tyagi, S Sharma, S Mohan - 2022 International Conference …, 2022 - ieeexplore.ieee.org
Autonomous connected vehicles are revolutionizing the automotive industry vision and
impacting their business model. This trend will likely impact other related industries and their …

Convergence of blockchain and Internet of Things: integration, security, and use cases

R Damaševičius, S Misra, R Maskeliūnas… - Frontiers of Information …, 2024 - Springer
Abstract Internet of Things (IoT) devices are becoming increasingly ubiquitous, and their
adoption is growing at an exponential rate. However, they are vulnerable to security …

Forensics and anti-forensics of a NAND flash memory: From a copy-back program perspective

NY Ahn, DH Lee - IEEE Access, 2021 - ieeexplore.ieee.org
This paper proposes a safe copy-back program operation in a NAND flash memory, which is
targeting digital forensics for a variety of reasons. Due to the background management …

A framework to reconstruct digital forensics evidence via goal-oriented modeling

A Ogundiran, H Chi, J Yan… - 2023 IEEE 2nd …, 2023 - ieeexplore.ieee.org
ThDeveloping a goal-oriented model for digital forensic evidence is critical because the
reconstructed scenarios help forensic analysts not only understand steps taken by threat …

Digital forensics meets ai: A game-changer for the 4th industrial revolution

S Malhotra - Artificial Intelligence and Blockchain in Digital …, 2023 - api.taylorfrancis.com
Digital forensics is defined as the actual process of recognizing, mining, documenting, and
safeguarding proofs, testimonials or evidence of a digital nature, which are admissible in a …

Habits attribution and digital evidence object models based tool for cybercrime investigation

Š Grigaliūnas, J Toldinas - Baltic journal of modern computing, 2020 - epubl.ktu.edu
Abstract [eng] The amount of data stored on computers is growing rapidly every year, which
makes time-consuming investigation of digital evidence in cybercrime, because of the need …