Vehicular network intrusion detection using a cascaded deep learning approach with multi-variant metaheuristic

A Manderna, S Kumar, U Dohare, M Aljaidi… - Sensors, 2023 - mdpi.com
Vehicle malfunctions have a direct impact on both human and road safety, making vehicle
network security an important and critical challenge. Vehicular ad hoc networks (VANETs) …

VADGAN: An Unsupervised GAN Framework for Enhanced Anomaly Detection in Connected and Autonomous Vehicles

S Devika, RR Shrivastava, P Narang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The utilization of Connected and Autonomous Vehicles (CAVs) is on the rise, driven by their
ability to provide vehicular services such as enhancing vehicle safety, aiding in intelligent …

Integrating multi-type aberrations from DNA and RNA through dynamic mapping gene space for subtype-specific breast cancer driver discovery

J Xi, Z Deng, Y Liu, Q Wang, W Shi - PeerJ, 2023 - peerj.com
Driver event discovery is a crucial demand for breast cancer diagnosis and therapy. In
particular, discovering subtype-specificity of drivers can prompt the personalized biomarker …

An Intelligent Fingerprinting Technique for Low-power Embedded IoT Devices

V Kohli, MN Aman, B Sikdar - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has been a popular topic for research and development in the
past decade. The resource-constrained and wireless nature of IoT devices presents a large …

SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things

V Kohli, MN Aman, B Sikdar - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent advances in the Internet of Things (IoT), machine learning, and edge computing
have led to the development of paradigms such as smart cities, smart grids, smart …

[PDF][PDF] Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud.

S Priya, RS Ponmagal - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
Handling service access in a cloud environment has been identified as a critical challenge
in the modern internet world due to the increased rate of intrusion attacks. To address such …