Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
In-vehicle communication cyber security: challenges and solutions
In-vehicle communication has become an integral part of today's driving environment
considering the growing add-ons of sensor-centric communication and computing devices …
considering the growing add-ons of sensor-centric communication and computing devices …
Ensemble machine learning models for the detection of energy theft
SK Gunturi, D Sarkar - Electric Power Systems Research, 2021 - Elsevier
Advanced metering infrastructure allows the two-way sharing of information between smart
meters and utilities. However, it makes smart grids more vulnerable to cyber-security threats …
meters and utilities. However, it makes smart grids more vulnerable to cyber-security threats …
Machine learning for security in vehicular networks: A comprehensive survey
A Talpur, M Gurusamy - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Machine Learning (ML) has emerged as an attractive and viable technique to provide
effective solutions for a wide range of application domains. An important application domain …
effective solutions for a wide range of application domains. An important application domain …
BEST—Blockchain-enabled secure and trusted public emergency services for smart cities environment
In the last few years, the Internet of things (IoT) has recently gained attention in developing
various smart city applications such as smart healthcare, smart supply chain, smart home …
various smart city applications such as smart healthcare, smart supply chain, smart home …
[HTML][HTML] Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities
As autonomous vehicles and the other supporting infrastructures (eg, smart cities and
intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) …
intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) …
An emerging threat Fileless malware: a survey and research challenges
Sudhakar, S Kumar - Cybersecurity, 2020 - Springer
With the evolution of cybersecurity countermeasures, the threat landscape has also evolved,
especially in malware from traditional file-based malware to sophisticated and multifarious …
especially in malware from traditional file-based malware to sophisticated and multifarious …
Machine learning-based detection for cyber security attacks on connected and autonomous vehicles
Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the
fastest expanding in recent years, and have started to affect the daily lives of people. More …
fastest expanding in recent years, and have started to affect the daily lives of people. More …
An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks
Intrusion detection is crucial in computer network security issues; therefore, this work is
aimed at maximizing network security protection and its improvement by proposing various …
aimed at maximizing network security protection and its improvement by proposing various …
A cooperative computing strategy for blockchain-secured fog computing
Fog computing is an emerging paradigm in provisioning computing and storage resources
for the Internet-of-Things (IoT) devices. In a fog computing system, all devices can offload …
for the Internet-of-Things (IoT) devices. In a fog computing system, all devices can offload …