[HTML][HTML] Cybersecurity testing for automotive domain: A survey

F Luo, X Zhang, Z Yang, Y Jiang, J Wang, M Wu… - Sensors, 2022 - mdpi.com
Modern vehicles are more complex and interconnected than ever before, which also means
that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not …

[HTML][HTML] Assessing risk and sustainability factors in spice supply chain management

V Kumar, R Raj, P Verma, JA Garza-Reyes… - Operations Management …, 2024 - Springer
The inopportune organization of spice supply chains (SSCs) results in aided risks, resource
wastages, and sustainability issues. Nevertheless, practitioners and academicians alike …

区块链访问控制技术在车联网中的应用研究综述与展望.

韦可欣, 李雷孝, 高昊昱, 熊啸 - Journal of Computer …, 2023 - search.ebscohost.com
智能汽车和新能源汽车的盛行使车联网系统结构更加复杂, 受到研究者的大量关注.
车联网因其自身节点移动速度快, 应对安全性攻击, 网络拓扑变化快, 节点链路持续时间短暂和 …

Investigation on AI-Based Techniques in Applications for Detecting Fatal Traffic Accidents

HP Patil, K Upreti, RC Poonia - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The difficulties with road accident rates today rank among the top concerns for health and
social policy in nations across the continents. In this essay, we've spoken about the fatalities …

Separation of Powers in India

D Sharma - Available at SSRN 4380967, 2023 - papers.ssrn.com
The underlying idea of the doctrine of separation of power is that the organs of the
government do not overlap or interchange the functions that are exercised by them …

Using Artificial Intelligence (AI) Methods on the Internet of Vehicles (IoV): Overview and Future Opportunities

AE Ahmadi, O Abdoun, EK Haimoudi - The International Conference on …, 2023 - Springer
Recent developments in communication technologies, intelligent transportation systems,
and computer systems have created many opportunities for intelligent traffic solutions that …

Application of cloud computing technology in computer secure storage

F Cao, L Zhang, DA Naik, JLA Gonzáles… - Scientific …, 2022 - Wiley Online Library
To investigate the use of cloud computing technologies in safe computer storage, firstly, it is
proposed to complete the central control function by building a cloud computing data center …

Towards an Intelligent Industrial Environment: Blockchain-Empowering Human-Centered Artificial Intelligence for Risk Assessment and Strategic Evaluation

A Khan, YL Chen, F Hajjej, AA Shaikh, J Yang… - Available at SSRN … - papers.ssrn.com
With the recent introduction of high-level human control and high-level IoT control in
intelligent transportation systems, their association with blockchain increases the …

An Improved Hierarchal Agglomerative Grouping Process and Bi-Objective Fusion Optimization Process for Optimum Source Detection

D Srinivas, N Jyothi, TR Gupta… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Computing in the cloud refers to a model that offers inexpensive, scalable computing
resources like CPU, storage, and network bandwidth. Allows users to access a shared pool …

[PDF][PDF] Research Article Application of Cloud Computing Technology in Computer Secure Storage

F Cao, L Zhang, DA Naik, JLA Gonzáles, N Verma… - 2022 - academia.edu
To investigate the use of cloud computing technologies in safe computer storage, firstly, it is
proposed to complete the central control function by building a cloud computing data center …