[1]. F. Jameel, Z. Chang, J. Huang, T. Ristaniemi, Internet of autonomous vehicles: architecture, features, and socio-technological challenges,
IEEE Wireless Communications,
2019,
26, 21-29. [
Crossref], [
Google Scholar], [
Publisher]
[2]. E. Yağdereli, C. Gemci, A.Z. Aktaş, A study on cyber-security of autonomous and unmanned vehicles,
The Journal of Defense Modeling and Simulation,
2015,
12, 369-381. [
Crossref], [
Google Scholar], [
Publisher]
[3]. S. Parkinson, P. Ward, K. Wilson, J. Miller, Cyber threats facing autonomous and connected vehicles: Future challenges,
IEEE Transactions on Intelligent Transportation Systems,
2017,
18, 2898-2915. [
Crossref], [
Google Scholar], [
Publisher]
[4]. V.K. Kukkala, S.V. Thiruloga, S. Pasricha, Roadmap for cybersecurity in autonomous vehicles,
IEEE Consumer Electronics Magazine,
2022,
11, 13-23. [
Crossref], [
Google Scholar], [
Publisher]
[5]. J. Petit, S.E. Shladover, Potential cyberattacks on automated vehicles,
IEEE Transactions on Intelligent transportation systems,
2014,
16, 546-556. [
Crossref], [
Google Scholar], [
Publisher]
[6]. M. Chowdhury, M. Islam, Z. Khan, Security of connected and automated vehicles,
arXiv Preprint Arxiv:2012.13464,
2020. [
Crossref], [
Google Scholar], [
Publisher]
[7]. F. Jahan, W. Sun, Q. Niyaz, M. Alam, Security modeling of autonomous systems: A survey,
ACM Computing Surveys (CSUR),
2019,
52, 1-34. [
Crossref], [
Google Scholar], [
Publisher]
[8]. A. Khadka, P. Karypidis, A. Lytos, G. Efstathopoulos, A benchmarking framework for cyber-attacks on autonomous vehicles,
Transportation Research Procedia,
2021,
52, 323-330. [
Crossref], [
Google Scholar], [
Publisher]
[9]. K. Kim, J.S. Kim, S. Jeong, J.H. Park, H.K. Kim, Cybersecurity for autonomous vehicles: Review of attacks and defense,
Computers & security,
2021,
103, 102150. [
Crossref], [
Google Scholar], [
Publisher]
[10]. X. Sun, F.R. Yu, P. Zhang, A survey on cyber-security of connected and autonomous vehicles (CAVs),
IEEE Transactions on Intelligent Transportation Systems,
2021,
23, 6240-6259. [
Crossref], [
Google Scholar], [
Publisher]
[11]. C. Gao, G. Wang, W. Shi, Z. Wang, Y. Chen, Autonomous driving security: State of the art and challenges,
IEEE Internet of Things Journal,
2021,
9, 7572-7595. [
Crossref], [
Google Scholar], [
Publisher]
[12]. M.C. Chow, M. Ma, Z. Pan, Attack models and countermeasures for autonomous vehicles,
Intelligent Technologies for Internet of Vehicles,
2021, 375-401. [
Crossref], [
Google Scholar], [
Publisher]
[13]. H.P.D. Nguyen, D.D. Nguyen, Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication,
Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead,
2021, 185-210. [
Crossref], [
Google Scholar], [
Publisher]
[14]. J.P.A. Yaacoub, H.N. Noura, O. Salman, A. Chehab, Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations,
International Journal of Information Security,
2022,
21, 115-158. [
Crossref], [
Google Scholar], [
Publisher]
[15]. P. Ranaweera, A. Jurcut, M. Liyanage, MEC-enabled 5G use cases: A survey on security vulnerabilities and countermeasures,
ACM Computing Surveys (CSUR),
2021,
54, 1-37. [
Crossref], [
Google Scholar], [
Publisher]
[16]. T. Campisi, A. Severino, M.A. Al-Rashid, G. Pau, The development of the smart cities in the connected and autonomous vehicles (CAVs) era: From mobility patterns to scaling in cities,
Infrastructures,
2021,
6, 100. [
Crossref], [
Google Scholar], [
Publisher]
[17]. M.A. Ribeiro, D. Gursoy, O.H. Chi, Customer acceptance of autonomous vehicles in travel and tourism,
Journal of Travel Research,
2022,
61, 620-636. [
Crossref], [
Google Scholar], [
Publisher]
[18]. E.V. Brovarone, J. Scudellari, L. Staricco, Planning the transition to autonomous driving: A policy pathway towards urban liveability,
Cities,
2021,
108, 102996. [
Crossref], [
Google Scholar], [
Publisher]
[19]. A. Aldakkhelallah, M. Simic, Autonomous vehicles in intelligent transportation systems, Human Centred Intelligent Systems: Proceedings of KES-HCIS 2021 Conference, Springer, 2021, pp. 185-198. [
Crossref], [
Google Scholar], [
Publisher]
[20]. A. Ahmadpour, Investigating the economic feasibility of using a fuel cell for a chlor-alkali unit of a petrochemical company,
Eurasian Journal of Chemical, Medicinal and Petroleum Research,
2024,
4, 42-55. [
Google Scholar], [
Publisher]
[21]. A. Ahmadpour, synthetic wastewater Treatment of methanol to propylene conversion unit by membrane bioreactor system,
Eurasian Journal of Chemical, Medicinal and Petroleum Research,
2024,
3, 140-151. [
Google Scholar], [
Publisher]
[22]. A. Algarni, V. Thayananthan, Improvement of 5G transportation services with SDN-based security solutions and beyond 5G,
Electronics,
2021,
10, 2490. [
Crossref], [
Google Scholar], [
Publisher]
[23]. R.A. Shaikh, V. Thayananthan, Risk-based decision methods for vehicular networks,
Electronics,
2019,
8, 627. [
Crossref], [
Google Scholar], [
Publisher]
[24]. V. Thayananthan, J. Yazdani, Secure Cyber-Physical Systems for improving transportation facilities in Smart cities and industry 4.0,
Secure Cyber-Physical Systems for Smart Cities,
2019, 1-26. [
Crossref], [
Google Scholar], [
Publisher]
[25]. A. Gupta, S.K. Gupta, Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks,
International Journal of Communication Systems,
2022,
35, e5237. [
Crossref], [
Google Scholar], [
Publisher]
[26]. D. Sharma, S.K. Gupta, A. Rashid, S. Gupta, M. Rashid, A. Srivastava, A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique,
Transactions on Emerging Telecommunications Technologies,
2021,
32, e4114. [
Crossref], [
Google Scholar], [
Publisher]
[27]. S. Kumar, M.K. Chaube, S.N. Nenavath, S.K. Gupta, S.K. Tetarave, Privacy preservation and security challenges: a new frontier multimodal machine learning research,
International Journal of Sensor Networks,
2022,
39, 227-245. [
Crossref], [
Google Scholar], [
Publisher]
[28]. A. Alharbi, A. Alotaibi, L. Alghofaili, M. Alsalamah, N. Alwasil, S. Elkhediri, Security in social-media: awareness of phishing attacks techniques and countermeasures,
2022 2nd International Conference on Computing and Information Technology (ICCIT), IEEE,
2022, 10-16. [
Crossref], [
Google Scholar], [
Publisher]
[29]. J. Chen, A.J. Gallo, S. Yan, T. Parisini, S.Y.R. Hui, Cyber-attack detection and countermeasure for distributed electric springs for smart grid applications,
IEEE Access,
2022,
10, 13182-13192. [
Crossref], [
Google Scholar], [
Publisher]
[30]. D. An, F. Zhang, Q. Yang, C. Zhang, Data integrity attack in dynamic state estimation of smart grid: Attack model and countermeasures,
IEEE Transactions on Automation Science and Engineering,
2022,
19, 1631-1644. [
Crossref], [
Google Scholar], [
Publisher]
[31]. A. Bahalul Haque, B. Bhushan, A. Nawar, K.R. Talha, S.J. Ayesha, Attacks and countermeasures in IoT based smart healthcare applications, Recent advances in internet of things and machine learning: Real-world applications,
2022, 67-90. [
Crossref], [
Google Scholar], [
Publisher]
[32]. M.N. Ahangar, Q.Z. Ahmed, F.A. Khan, M. Hafeez, A survey of autonomous vehicles: Enabling communication technologies and challenges,
Sensors,
2021,
21, 706. [
Crossref], [
Google Scholar], [
Publisher]
[33]. H. Bangui, M. Ge, B. Buhnova, L. Hong Trang, Towards faster big data analytics for anti‐jamming applications in vehicular ad‐hoc network,
Transactions on Emerging Telecommunications Technologies,
2021,
32, e4280. [
Crossref], [
Google Scholar], [
Publisher]
[34]. H. Bangui, M. Ge, B. Buhnova, Improving big data clustering for jamming detection in smart mobility,
ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, Proceedings 35, 2020, 78-91. [
Crossref], [
Google Scholar], [
Publisher]
[35]. A. Samimi, Risk Management in EPC Projects,
Eurasian Journal of Chemical, Medicinal and Petroleum Research 3,
2024, 191-201. [
Crossref], [
Google Scholar], [
Publisher]
[36]. J. Renn, Einstein's invention of Brownian motion,
Annalen der Physik,
2005,
517, 23-37. [
Crossref], [
Google Scholar], [
Publisher]
[37]. S. Bokhari, S. Hamrioui, M. Aider, Cybersecurity strategy under uncertainties for an IoE environment,
Journal of Network and Computer Applications,
2022,
205, 103426. [
Crossref], [
Google Scholar], [
Publisher]
[38]. N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, Analyzing the energy consumption of security protocols,
Proceedings of the 2003 International Symposium on Low Power Electronics and Design,
2003, 30-35. [
Crossref], [
Google Scholar], [
Publisher]
[39]. S.A. Oussous, F.Z. Hamza, S. Beloualid, A.E. Allali, A. Bajit, A. Tamtaoui, Green smart city intelligent and cyber-security-based iot transportation solutions for combating the Pandemic COVID-19,
Computational Intelligence Techniques for Green Smart Cities,
2022, 129-146. [
Crossref], [
Google Scholar], [
Publisher]
[40]. D. Said, M. Elloumi, L. Khoukhi, Cyber-attack on P2P energy transaction between connected electric vehicles: A false data injection detection-based machine learning model,
IEEE access,
2022,
10, 63640-63647. [
Crossref], [
Google Scholar], [
Publisher]
[41]. S. Srivastava, A. Tiwari, P.K. Srivastava, Review on quantum safe algorithms based on Symmetric Key and Asymmetric Key Encryption methods,
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), IEEE,
2022, 905-908. [
Crossref], [
Google Scholar], [
Publisher]