Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art

P Sharma, J Gillanders - IEEE Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for shaping the future of transportation systems. CAV …

A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey

M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

A Arshad, ZM Hanapi, S Subramaniam… - PeerJ Computer …, 2021 - peerj.com
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects

A Srivastava, S Gupta, M Quamara… - International Journal …, 2020 - Wiley Online Library
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards
has fascinated noteworthy consideration from numerous research communities. In this view …

Game Theoretic Defense Framework Against Sybil Attacks

B Kumar, B Bhuyan - SN Computer Science, 2024 - Springer
Sybil attacks are treacherous attacks on the reputation mechanism of a network. In our
current work, we propose a game theory-based defense mechanism against such attacks …

Network traffic anomaly detection based on Viterbi algorithm using SNMP MIB data

S Alhaidari, A Alharbi, M Alshaikhsaleh… - Proceedings of the …, 2019 - dl.acm.org
With the growing number of attacks and malicious threats on the Internet services and
network infrastructures, the need for techniques to identify and detect attacks is increasing …

Enhancing blockchain security through natural language processing and real-time monitoring

F Salzano, R Pareschi - International Journal of Parallel, Emergent …, 2023 - Taylor & Francis
We describe implementing and testing a security monitoring system for Blockchain-based
applications by performing Log Analysis through natural language processing (NLP) …

A survey on security threats and network vulnerabilities in Internet of Things

HK Saini, M Poriye, N Goyal - Big Data Analytics in Intelligent IoT and …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of physical objects like sensors and actuators etc.
connected through the network for dynamic exchange of information for augmenting the …

Humanode whitepaper: You are [not] a bot

D Kavazi, V Smirnov, S Shilina, MD Li… - arXiv preprint arXiv …, 2021 - arxiv.org
The advent of blockchain technology has led to a massive wave of different decentralized
ledger technology (DLT) solutions. Such projects as Bitcoin and Ethereum have shifted the …

Emergence of blockchain technology: a reliable and secure solution for IoT systems

AKMB Haque, B Bhushan - Blockchain technology for data privacy …, 2021 - taylorfrancis.com
The Internet of Things (IoT) is dominating every aspect of life. Smart homes, security
systems, industrial automation, smart and intelligent power grids, etc. are important …