At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives

A Bourechak, O Zedadra, MN Kouahla, A Guerrieri… - Sensors, 2023 - mdpi.com
Given its advantages in low latency, fast response, context-aware services, mobility, and
privacy preservation, edge computing has emerged as the key support for intelligent …

Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review

B Ma, X Wang, X Lin, Y Jiang, C Sun, Z Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Location privacy is critical in vehicular networks, where drivers' trajectories and personal
information can be exposed, allowing adversaries to launch data and physical attacks that …

Autonomous vehicles with a 6g-based intelligent cybersecurity model

AM Algarni, V Thayananthan - Ieee Access, 2023 - ieeexplore.ieee.org
Sixth-generation (6G)-based communications have many applications and are emerging as
a new system to utilize existing vehicles and communication devices in autonomous …

A novel and efficient framework for in-vehicle security enforcement

A Haddaji, S Ayed, LC Fourati - Ad Hoc Networks, 2024 - Elsevier
Abstract The Internet of Vehicles (IoV) has garnered significant popularity thanks to rapid
technological advancements and the widespread availability of the Internet. IoV …

The Role of Artificial Intelligence in Mitigating Cyber Security Issues and its Impact on FinTech

MHS Inairat, NMF Sahawneh, MA Faiz… - … for Technology and …, 2023 - ieeexplore.ieee.org
Given the status of cybersecurity today, it seems natural that researchers are seriously
considering how artificial intelligence may help breakthroughs in conventional cybersecurity …

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)

F Tlili, S Ayed, LC Fourati - Computers & Security, 2024 - Elsevier
Distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs
designed for implementation in distributed environments. Each IDS is integrated into distinct …

Generative Boltzmann adversarial network in Manet attack detection and QOS enhancement with latency

AK Marandi, R Dogra, R Bhatt, R Gupta… - International …, 2022 - search.proquest.com
Abstract Mobile Ad-Hoc Network (MANET) are considered as self-configured network those
does not have any centralized base station for the network monitoring and control. MANET …

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective

MM Aslam, A Tufail, RAAHM Apong, LC De Silva… - IEEE …, 2024 - ieeexplore.ieee.org
Technological advancement plays a crucial role in our daily lives and constantly transforms
the industrial sector. However, these technologies also introduce new security vulnerabilities …

A New Hybrid Adaptive Deep Learning-based Framework for UAVs Faults and Attacks Detection

F Tlili, S Ayed, LC Fourati - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
A resilient and guaranteed Unmanned Aerial Vehicles (UAVs) security framework should be
designed to be secure against different types of attacks and faults. Recent developments …

Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation

BJ Asaju - Journal of Computational Intelligence and …, 2024 - thesciencebrigade.com
The proliferation of Internet of Things (IoT) technology has extended its reach to the
automotive domain, notably through Vehicle-to-Everything (V2X) communication. This …