ROS‐Ethereum: A Convenient Tool to Bridge ROS and Blockchain (Ethereum)

S Zhang, M Tang, X Li, B Liu, B Zhang… - Security and …, 2022 - Wiley Online Library
Robot Operating System (ROS) has received widespread utilization with the development of
robotics, self‐driving, etc., recently. Meanwhile, the other technology blockchain is frequently …

[HTML][HTML] Improving collaborative intrusion detection system using blockchain and pluggable authentication modules for sustainable smart city

RK Gupta, V Chawla, RK Pateriya, PK Shukla… - Sustainability, 2023 - mdpi.com
The threat of cyber-attacks is ever increasing in today's society. There is a clear need for
better and more effective defensive tools. Intrusion detection can be defined as the detection …

Blockchain‐based multi‐layered federated extreme learning networks in connected vehicles

D Rajan, P Eswaran, G Srivastava, K Ramana… - Expert …, 2023 - Wiley Online Library
Intelligent and networked vehicles help build an efficient vehicular network's infrastructure.
The widespread use of electronic software exposes these networks to cyber‐attacks …

[PDF][PDF] Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System.

T Althobaiti, Y Sanjalawe… - … Systems Science & …, 2023 - cdn.techscience.cn
Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is
becoming increasingly difficult to detect due to its ability to imitate normal user behavior in …

RETRACTED ARTICLE: Hybrid deep learning model for automatic fake news detection

OA Hanshal, ON Ucan, YK Sanjalawe - Applied Nanoscience, 2023 - Springer
With the fast advancement in digital news, fake news has already caused grave threats to
the public's actual judgment and credibility, in specific, with the wide use of social …

[HTML][HTML] Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform

Y Sanjalawe, S Fraihat - Computers & Security, 2023 - Elsevier
Abstract The Onion Router (TOR) network is a decentralized system of volunteer-run servers
that aims to protect the anonymity and privacy of users by routing their internet traffic through …

Digital Forensics Meets Blockchain: Enhancing Evidence Authenticity and Traceability

Y Sanjalawe, S Makhadmeh… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of cybercrime, ensuring the authenticity and traceability of
digital evidence has become paramount. This paper explores the integration of blockchain …

A survey on privacy protection of cross-chain

J Wang, J Cheng, Y Yuan, H Li, VS Sheng - International Conference on …, 2022 - Springer
Blockchain technology has gained widespread attention due to its features of
decentralization, tamper resistance, and traceability. Various decentralized applications …

Abnormal Transactions Detection in the Ethereum Network Using Semi-Supervised Generative Adversarial Networks

YK Sanjalawe, SR Al-E'mari - IEEE Access, 2023 - ieeexplore.ieee.org
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …

An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems

AA Abubakar, J Liu, E Gilliard - Electronics Letters, 2023 - Wiley Online Library
Abstract Intrusion Detection System (IDS) is a critical cybersecurity task that involves
monitoring network traffic for malicious activity and taking appropriate action to stop it …