[HTML][HTML] A review on electric vehicle: Technologies, energy trading, and cyber security

M Bharathidasan, V Indragandhi, V Suresh, M Jasiński… - Energy Reports, 2022 - Elsevier
The energy transition is an essential effort from a variety of sectors and levels to achieve a
carbon-neutral, larger-renewable integrated civilization. The transportation industry, which is …

[HTML][HTML] Blockchain-based peer-to-peer energy trading and charging payment system for electric vehicles

PW Khan, YC Byun - Sustainability, 2021 - mdpi.com
The world is moving rapidly from carbon-producing vehicles to green transportation systems.
Electric vehicles (EV) are a big step towards a friendly mode of transport. With the constant …

[HTML][HTML] Algorithmic decision-making in AVs: Understanding ethical and technical concerns for smart cities

HSM Lim, A Taeihagh - Sustainability, 2019 - mdpi.com
Autonomous Vehicles (AVs) are increasingly embraced around the world to advance smart
mobility and more broadly, smart, and sustainable cities. Algorithms form the basis of …

Data cleaning and restoring method for vehicle battery big data platform

S Li, H He, P Zhao, S Cheng - Applied Energy, 2022 - Elsevier
Battery is one of the most important and costly devices in electric vehicles (EVs). Developing
an efficient battery management method is of great significance to enhancing vehicle safety …

Resilience assessment of electrified road networks subject to charging station failures

H Wang, AF Abdin, YP Fang… - Computer‐Aided Civil and …, 2022 - Wiley Online Library
The number of electric vehicles (EVs) and charging facilities is expected to increase
significantly in the near future, further coupling the existing transportation system with the …

GLIDE: A Game Theory and Data‐Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Q Li, J Hou, S Meng, H Long - Complexity, 2020 - Wiley Online Library
The real‐time and high‐continuity requirements of the edge computing network gain more
and more attention because of its active defence problem, that is, a data‐driven complex …

[HTML][HTML] A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods

T Aljohani, A Almutairi - Defence Technology, 2024 - Elsevier
With the continuous development of transportation electrification, the cybersecurity of energy
infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool …

DDoS attack detection based on random forest

Y Chen, J Hou, Q Li, H Long - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
With the development of network technology, distributed denial of service (DDoS) attacks
have increasingly become an important security risk that endangers the network. It uses …

Intelligent processing of intrusion detection data

T Duan, Y Tian, H Zhang, Y Liu, Q Li, J Jiang… - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion detection technology, as an active and effective dynamic network defense
technology, has rapidly become a hot research topic in the field of network security since it …

A novel machine learning pipeline to detect malicious anomalies for the Internet of Things

RM Shukla, S Sengupta - Internet of Things, 2022 - Elsevier
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The
anomalies are considered as samples that do not follow a normal pattern and significantly …