A comprehensive survey on the applications of blockchain for securing vehicular networks

T Alladi, V Chamola, N Sahu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Vehicular networks promise features such as traffic management, route scheduling, data
exchange, entertainment, and much more. With any large-scale technological integration …

A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions

A Kalla, C De Alwis, P Porambage, G Gür… - Journal of Industrial …, 2022 - Elsevier
While 5G is at the early deployment state around the globe, the research and industrial
communities have already started concentrating their efforts on formulating the overall 6G …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Blockchain: How shipping industry is dealing with the ultimate technological leap

G Bavassano, C Ferrari, A Tei - Research in Transportation Business & …, 2020 - Elsevier
Despite its historical resilience to innovation, several novel technologies (eg IoT, AIS data,
and automation) have recently been introduced in the maritime sector: the majority of them …

Design of intrusion detection honeypot using social leopard algorithm to detect IoT ransomware attacks

SS Chakkaravarthy, D Sangeetha, MV Cruz… - IEEE …, 2020 - ieeexplore.ieee.org
In recent times, ransomware has become the most significant cyber-attack targeting
individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing …

Smart contract-based caching and data transaction optimization in mobile edge computing

G Wang, C Li, Y Huang, X Wang, Y Luo - Knowledge-Based Systems, 2022 - Elsevier
The emergence of mobile edge computing can provide technical support for the
development of Internet services and for coping with massive data traffic, thereby reducing …

Multi‐Cloud Integration Security Framework Using Honeypots

T Alyas, K Alissa, M Alqahtani, T Faiz… - Mobile Information …, 2022 - Wiley Online Library
This rapidly changing digital world is always sensitive to improving security and resilience to
protect the inhabitants of this ecosystem in terms of data, processes, repositories …

Blockchain for future wireless networks: A decade survey

T Rathod, NK Jadav, MD Alshehri, S Tanwar… - Sensors, 2022 - mdpi.com
The emerging need for high data rate, low latency, and high network capacity encourages
wireless networks (WNs) to build intelligent and dynamic services, such as intelligent …

Duplicity games for deception design with an application to insider threat mitigation

L Huang, Q Zhu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Recent incidents such as the Colonial Pipeline ransomware attack and the SolarWinds hack
have shown that traditional defense techniques are becoming insufficient to deter …

MAGD: Minimal attack graph generation dynamically in cyber security

M Mohammadzad, J Karimpour, F Mahan - Computer Networks, 2023 - Elsevier
Cyber security faces challenges in detecting and mitigating complex attacks. Security
solutions have employed Attack Graphs (AGs) for modeling multi-stage attacks, but …