Blockchain-enabled vehicular ad hoc networks: A systematic literature review

M Saad, MK Khan, MB Ahmad - Sustainability, 2022 - mdpi.com
This systematic literature review provides an extensive categorization of the blockchain-
enabled applications across the domain of vehicular ad hoc networks (VANETs). Within the …

Novel hybrid model for intrusion prediction on cyber physical systems' communication networks based on bio-inspired deep neural network structure

AE Ibor, OB Okunoye, FA Oladeji… - Journal of Information …, 2022 - Elsevier
There are growing concerns on the security of communication networks of Cyber Physical
Systems (CPSs). In a typical Cyber Physical System (CPS), the plant, actuators, sensors and …

Recommendation of Contemporary Fashion Trends via AI-Enhanced Multimodal Search Engine and Blockchain Integration

S Gore, GSPS Dhindsa, S Gore… - … on Electronics and …, 2023 - ieeexplore.ieee.org
The evolution of advanced technology paved way for various automations and innovations
in the manufacturing and production sectors in clothing industry. The fashion is a form of …

Machine Learning in Cyber Threats Intelligent System

W Jaisingh, P Nanjundan… - Artificial Intelligence for …, 2024 - taylorfrancis.com
Cybercriminals disrupt services, exfiltrate sensitive data, and exploit victim machines and
networks to perform malicious activities against organizations. A malicious adversary seeks …

Applying honeypot technology with adaptive behavior to internet-of-things networks

TD Ovasapyan, VA Nikulkin, DA Moskvin - Automatic Control and …, 2021 - Springer
The application of the honeypot technology with adaptive behavior to monitor and analyze
attacks on Internet-of-Things networks is considered. Existing adaptive systems are …

Use of graph representation and case analysis to assess the security of computer systems

EA Zaitseva, DP Zegzhda, MA Poltavtseva - Automatic Control and …, 2019 - Springer
We propose an approach to assess the security of computer systems based on case
analysis. To implement case analysis, it is proposed to use the graph representation in …

Применение технологии honeypot с адаптивным поведением для сетей интернета вещей

ТД Овасапян, ВА Никулкин, ДА Москвин - Проблемы …, 2021 - elibrary.ru
Рассматривается применение технологии Honeypot c адаптивным поведением для
отслеживания и анализа атак на сети Интернета вещей. Проанализированы …

Blockchain based system model for assessment of security against threats caused by uneven distribution of computational power

AG Busygin, AS Konoplev - Automatic Control and Computer Sciences, 2020 - Springer
Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven
Distribution of Computational Power | SpringerLink Skip to main content Advertisement …

Использование графового представления и прецедентного анализа для оценки защищенности компьютерных систем

ЕА Зайцева, ДП Зегжда, МА Полтавцева - Проблемы …, 2019 - elibrary.ru
Предложен подход к оценке защищенности компьютерных систем на основе
прецедентного анализа. Для реализации прецедентного анализа используется …

Development of dynamic topology control strategies for MANET integrated with VANET using deep learning

AN Upadhyaya, B Sampathkumar… - Challenges in …, 2025 - taylorfrancis.com
This research introduces a new urban travel model that combines VANET and MANET
technologies to enhance road safety, traffic flow optimization, and provide various …