Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

In-vehicle communication cyber security: challenges and solutions

RS Rathore, C Hewage, O Kaiwartya, J Lloret - Sensors, 2022 - mdpi.com
In-vehicle communication has become an integral part of today's driving environment
considering the growing add-ons of sensor-centric communication and computing devices …

Ensemble machine learning models for the detection of energy theft

SK Gunturi, D Sarkar - Electric Power Systems Research, 2021 - Elsevier
Advanced metering infrastructure allows the two-way sharing of information between smart
meters and utilities. However, it makes smart grids more vulnerable to cyber-security threats …

Machine learning for security in vehicular networks: A comprehensive survey

A Talpur, M Gurusamy - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Machine Learning (ML) has emerged as an attractive and viable technique to provide
effective solutions for a wide range of application domains. An important application domain …

BEST—Blockchain-enabled secure and trusted public emergency services for smart cities environment

Bhawana, S Kumar, RS Rathore, M Mahmud… - Sensors, 2022 - mdpi.com
In the last few years, the Internet of things (IoT) has recently gained attention in developing
various smart city applications such as smart healthcare, smart supply chain, smart home …

[HTML][HTML] Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities

J Guo, M Bilal, Y Qiu, C Qian, X Xu… - Digital Communications …, 2024 - Elsevier
As autonomous vehicles and the other supporting infrastructures (eg, smart cities and
intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) …

An emerging threat Fileless malware: a survey and research challenges

Sudhakar, S Kumar - Cybersecurity, 2020 - Springer
With the evolution of cybersecurity countermeasures, the threat landscape has also evolved,
especially in malware from traditional file-based malware to sophisticated and multifarious …

Machine learning-based detection for cyber security attacks on connected and autonomous vehicles

Q He, X Meng, R Qu, R Xi - Mathematics, 2020 - mdpi.com
Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the
fastest expanding in recent years, and have started to affect the daily lives of people. More …

An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks

Y Wang, J Ma, A Sharma, PK Singh… - Journal of …, 2021 - Wiley Online Library
Intrusion detection is crucial in computer network security issues; therefore, this work is
aimed at maximizing network security protection and its improvement by proposing various …

A cooperative computing strategy for blockchain-secured fog computing

D Wu, N Ansari - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Fog computing is an emerging paradigm in provisioning computing and storage resources
for the Internet-of-Things (IoT) devices. In a fog computing system, all devices can offload …