V2X Current Security Issues, Standards, Challenges, Use Cases, and Future Trends

2020 ◽  
pp. 183-212
Author(s):  
Shiho Kim ◽  
Rakesh Shrestha
Author(s):  
Shuting Xu

Text mining is an instrumental technology that today’s organizations can employ to extract information and further evolve and create valuable knowledge for more effective knowledge management. It is also an important tool in the arena of information systems security (ISS). While a plethora of text mining research has been conducted in search of revamped technological developments, relatively limited attention has been paid to the applicable insights of text mining in ISS. In this chapter, we address a variety of technological applications of text mining in security issues. The techniques are categorized according to the types of knowledge to be discovered and the text formats to be analyzed. Privacy issues of text mining as well as future trends are also discussed.


2019 ◽  
Vol 37 ◽  
pp. 100900 ◽  
Author(s):  
Nasir Saeed ◽  
Shuaishuai Guo ◽  
Ki-Hong Park ◽  
Tareq Y. Al-Naffouri ◽  
Mohamed-Slim Alouini
Keyword(s):  

2022 ◽  
Vol 54 (8) ◽  
pp. 1-41
Author(s):  
Rafael Belchior ◽  
André Vasconcelos ◽  
Sérgio Guerreiro ◽  
Miguel Correia

Blockchain interoperability is emerging as one of the crucial features of blockchain technology, but the knowledge necessary for achieving it is fragmented. This fact makes it challenging for academics and the industry to achieve interoperability among blockchains seamlessly. Given this new domain’s novelty and potential, we conduct a literature review on blockchain interoperability by collecting 284 papers and 120 grey literature documents, constituting a corpus of 404 documents. From those 404 documents, we systematically analyzed and discussed 102 documents, including peer-reviewed papers and grey literature. Our review classifies studies in three categories: Public Connectors, Blockchain of Blockchains, and Hybrid Connectors. Each category is further divided into sub-categories based on defined criteria. We classify 67 existing solutions in one sub-category using the Blockchain Interoperability Framework, providing a holistic overview of blockchain interoperability. Our findings show that blockchain interoperability has a much broader spectrum than cryptocurrencies and cross-chain asset transfers. Finally, this article discusses supporting technologies, standards, use cases, open challenges, and future research directions, paving the way for research in the area.


2021 ◽  
pp. 333-354
Author(s):  
Ray Walshe

AbstractThis chapter covers the critical topic of standards within the area of big data. Starting with an overview of standardisation as a means for achieving interoperability, the chapter moves on to identify the European Standards Development Organizations that contribute to the European Commission’s plan for the Digital Single Market. The author goes on to describe, through use cases, exemplar big data challenges, demonstrates the need for standardisation and finally identifies the critical big data use cases where standards can add value. The chapter provides an overview of the key standardisation activities within the EU and the current status of international standardisation efforts. Finally, the chapter closes with future trends for big data standardisation.


Author(s):  
Syrine Sahmim Ep Guerbouj ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.


2021 ◽  
Vol 17 (11) ◽  
pp. 1031-1045
Author(s):  
Imran ◽  
Syed Mubashir Ali ◽  
Muhammad Mansoor Alam ◽  
Mazliham Mohd Su’ud

2013 ◽  
Vol 69 (24) ◽  
pp. 36-42 ◽  
Author(s):  
Pooja Kedia ◽  
Renuka Nagpal ◽  
Tejinder Pal Singh

2011 ◽  
pp. 2047-2063
Author(s):  
Changhua Zhu ◽  
Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.


Author(s):  
Shuting Xu ◽  
Xin Luo

Text mining is an instrumental technology that today’s organizations can employ to extract information and further evolve and create valuable knowledge for more effective knowledge management. It is also an important tool in the arena of information systems security (ISS). While a plethora of text mining research has been conducted in search of revamped technological developments, relatively limited attention has been paid to the applicable insights of text mining in ISS. In this chapter, we address a variety of technological applications of text mining in security issues. The techniques are categorized according to the types of knowledge to be discovered and the text formats to be analyzed. Privacy issues of text mining as well as future trends are also discussed.


Author(s):  
Chaogang Tang ◽  
Xianglin Wei ◽  
Chong Liu ◽  
Haifeng Jiang ◽  
Huaming Wu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document