A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

MKF-ADS: A Multi-Knowledge Fused Anomaly Detection System for Automotive

P Cheng, Z Wu, G Liu - arXiv preprint arXiv:2403.04293, 2024 - arxiv.org
With the requirements of Intelligent Transport Systems (ITSs) for extensive connectivity of
Electronic Control Units (ECUs) to the outside world, safety and security have become …

Secure WSN Architecture Utilizing Hybrid Encryption with DKM to Ensure Consistent IoV Communication

UK Lilhore, S Simaiya, S Dalal, YK Sharma… - Wireless Personal …, 2024 - Springer
Reliable communication is essential in the Internet of Vehicles (IoV) framework, where the
efficient transmission of important information is required to ensure vehicle safety and smart …

Infographics In The Literacy Of Statistical Skills In University Students

ÁS Melgar, D Fuster-Guillen, RAR Lozano… - Journal of …, 2022 - pnrjournal.com
The results of the study made it possible to answer the question of what the use of
infographics is like, as well as the literacy of statistical skills. For this purpose, experimental …

Computation offloading and heterogeneous task caching in MEC-enabled vehicular networks

R Wu, B Li - The Journal of Supercomputing, 2023 - Springer
Given the rapid growth of business types and the characteristics of delay-sensitive tasks in
vehicular networks, vehicles' computing power is insufficient to handle the demands of a …

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

M Badawy - IJCI. International Journal of Computers and …, 2023 - journals.ekb.eg
The emergence of the Internet of Things (IoT) represents a significant trend, where
integrating IP, data, and wireless technologies onto a single network yields substantial …

Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review

SA Wadho, AF Meghji, A Yichiet, R Kumar… - … on Computer Sciences, 2023 - vfast.org
The danger of cyber-attacks is constant in the current digital environment. The necessity for
effective security actions are more crucial than ever before due to the increasingly complex …

Blockchain-Envisioned Onion Routing Framework for Internet of Vehicles Communication toward 6G

NK Jadav, A Nair, R Gupta, S Tanwar… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of things (IoT) guided the rapid transformation of traditional vehicle
ad-hoc networks (VANETs) into the Internet of vehicles (IoVs). It started with a sharp rise in …

SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles

D Jegatheesan, C Arumugam - Wireless Networks, 2024 - Springer
Abstract The Social Internet of Vehicles (SIoV) is an emerging network that interconnects
vehicles and generates vast amounts of data concerning social relationships, chauffeurs …

Privacy-Preserving Intrusion Detection System for Internet of Vehicles using Split Learning

P Agbaje, A Anjum, A Mitra, S Hounsinou… - Proceedings of the …, 2023 - dl.acm.org
The Internet of Vehicles (IoV) is envisioned to improve road safety, reduce traffic congestion,
and minimize pollution. However, the connectedness of IoV entities increases the risk of …