Ai-based intrusion detection systems for in-vehicle networks: A survey

S Rajapaksha, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The Controller Area Network (CAN) is the most widely used in-vehicle communication
protocol, which still lacks the implementation of suitable security mechanisms such as …

Self‐sovereign identity solution for blockchain‐based land registry system: A comparison

M Shuaib, NH Hassan, S Usman… - Mobile Information …, 2022 - Wiley Online Library
Providing an identity solution is essential for a reliable blockchain‐based land registry
system. A secure, privacy‐preserving, and efficient identity solution is essential but …

[HTML][HTML] In-vehicle communication cyber security: challenges and solutions

RS Rathore, C Hewage, O Kaiwartya, J Lloret - Sensors, 2022 - mdpi.com
In-vehicle communication has become an integral part of today's driving environment
considering the growing add-ons of sensor-centric communication and computing devices …

[HTML][HTML] Wireless communications for data security: Efficiency assessment of cybersecurity industry—A promising application for UAVs

CN Wang, FC Yang, NTM Vo, VTT Nguyen - Drones, 2022 - mdpi.com
The design of cooperative applications combining several unmanned aerial and aquatic
vehicles is now possible thanks to the considerable advancements in wireless …

[PDF][PDF] The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review

M Mijwil, IE Salem, MM Ismaeel - Iraqi Journal For Computer Science and …, 2023 - iasj.net
People in the modern era spend most of their lives in virtual environments that offer a range
of public and private services and social platforms. Therefore, these environments need to …

[HTML][HTML] Cyber security for detecting distributed denial of service attacks in agriculture 4.0: Deep learning model

THH Aldhyani, H Alkahtani - Mathematics, 2023 - mdpi.com
Attackers are increasingly targeting Internet of Things (IoT) networks, which connect
industrial devices to the Internet. To construct network intrusion detection systems (NIDSs) …

Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence

G Bendiab, A Hameurlaine, G Germanos… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …

[HTML][HTML] Artificial intelligence algorithms for malware detection in android-operated mobile devices

H Alkahtani, THH Aldhyani - Sensors, 2022 - mdpi.com
With the rapid expansion of the use of smartphone devices, malicious attacks against
Android mobile devices have increased. The Android system adopted a wide range of …

[HTML][HTML] Deep learning algorithm to predict cryptocurrency fluctuation prices: Increasing investment awareness

MA Ammer, THH Aldhyani - Electronics, 2022 - mdpi.com
Digital currencies such as Ethereum and XRP allow for all transactions to be carried out
online. To emphasize the decentralized nature of fiat currency, we can refer, for example, to …

[HTML][HTML] Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments

THH Aldhyani, H Alkahtani - Sensors, 2022 - mdpi.com
Cloud computing is currently the most cost-effective means of providing commercial and
consumer IT services online. However, it is prone to new flaws. An economic denial of …