Machine learning technologies for secure vehicular communication in internet of vehicles: recent advances and applications

ES Ali, MK Hasan, R Hassan, RA Saeed… - Security and …, 2021 - Wiley Online Library
Recently, interest in Internet of Vehicles'(IoV) technologies has significantly emerged due to
the substantial development in the smart automobile industries. Internet of Vehicles' …

Internet of vehicle's resource management in 5G networks using AI technologies: Current status and trends

NM Elfatih, MK Hasan, Z Kamal, D Gupta… - IET …, 2022 - Wiley Online Library
Abstract The Internet of Vehicles (IoV) and Vehicle‐to‐Everything (V2X) concept have
emerged from IoT technology, which refers to connecting many vehicles with various …

A comprehensive review on the users' identity privacy for 5G networks

MM Saeed, MK Hasan, AJ Obaid, RA Saeed… - IET …, 2022 - Wiley Online Library
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …

Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic …

AW Khan, MU Khan, JA Khan, A Ahmad, K Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Recently, its becomes easy to track down the data due to its availability in a large number.
Although for data management, processing, and obtainability, cloud computing is …

Machine learning technologies in internet of vehicles

ES Ali, MB Hassan, RA Saeed - Intelligent technologies for Internet of …, 2021 - Springer
Recently, there was much interest in Technology which has emerged greatly to the
development of smart cars. Internet of Vehicle (IoV) enables vehicles to communicate with …

Secure authentication in cloud big data with hierarchical attribute authorization structure

J Shen, D Liu, Q Liu, X Sun… - IEEE Transactions on Big …, 2017 - ieeexplore.ieee.org
With the fast growing demands for the big data, we need to manage and store the big data in
the cloud. Since the cloud is not fully trusted and it can be accessed by any users, the data in …

A comparative study on cloud and edgeb computing: A survey on current research activities and applications

M Barakat, RA Saeed, S Edam - 2023 IEEE 3rd International …, 2023 - ieeexplore.ieee.org
Cloud computing and edge computing are distinct architectures that process data. Cloud
computing is a centralized model of computing where data is stored and processed in a …

Preserving Privacy of Paging Procedure in 5thG Using Identity-Division Multiplexing

MM Saeed, RA Saeed, E Saeid - 2019 First International …, 2019 - ieeexplore.ieee.org
Although the efforts have been made by Third Generation Partnership Project (3GPP)
toward enhancing privacy preserving competences, but it does not remove the probability of …

Cloud and big data security system's review principles: A decisive investigation

KN Mishra, V Bhattacharjee, S Saket… - Wireless Personal …, 2022 - Springer
We perceive big data with massive datasets of complex and variegated structures in the
modern era. Such attributes formulate hindrances while analyzing and storing the data to …

Policy enforcement for big data security

A Al-Shomrani, F Fathy, K Jambi - 2017 2nd international …, 2017 - ieeexplore.ieee.org
Security and privacy of big data becomes challenging as data grows and more accessible
by more and more clients. Large-scale data storage is becoming a necessity for healthcare …