2021
DOI: 10.1109/jiot.2020.3008488
|View full text |Cite
|
Sign up to set email alerts
|

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 75 publications
(19 citation statements)
references
References 46 publications
0
19
0
Order By: Relevance
“…Mourad et al 78 suggested a fog‐enabled vehicular edge computing architecture that allows intrusion detection tasks to be offloaded to federated vehicle nodes located inside adjacent created ad hoc vehicular fog and conducted collaboratively with minimal delay. The challenge was presented as a multi‐objective optimization model and addressed through a genetic algorithm that maximized offloading survival while reducing compute execution time and energy usage in the context of high mobility.…”
Section: Review Of the Articlesmentioning
confidence: 99%
“…Mourad et al 78 suggested a fog‐enabled vehicular edge computing architecture that allows intrusion detection tasks to be offloaded to federated vehicle nodes located inside adjacent created ad hoc vehicular fog and conducted collaboratively with minimal delay. The challenge was presented as a multi‐objective optimization model and addressed through a genetic algorithm that maximized offloading survival while reducing compute execution time and energy usage in the context of high mobility.…”
Section: Review Of the Articlesmentioning
confidence: 99%
“…The results of EIDS-ACC-OD technique showed the accuracy, precision, recall, specificity, F1-score, false positive ratio (FRT), and false negative ratio (FNR). From the review, [21][22][23][24][25][26][27][28][29][30][31][32][33] with the increased use of the Internet and the services it provides, there has been an increase in cyber attacks for the use of information. Cloud computing is a technology used to store and maintain user information due to its simplicity and low budget services.…”
Section: Research Gapmentioning
confidence: 99%
“…CLNN stores complete information that is relevant and relevant to the assignment. The parent capsule i is calculated using the Equation ( 26), when the output of the capsule j is P i|j P i|j = Z ji P j (26) During the rearward pass, Z ji indicates the learned matrix weight. The coupling coefficient is calculated using the "Softmax Activation" function, which measures the similarity and compatibility between the capsules and the parent layers in the layers below.…”
Section: Instruction Detection Using Capsule Learn Based Neural Netwo...mentioning
confidence: 99%
See 1 more Smart Citation
“…Protecting the location privacy of vehicles has become an important research topic of vehicular networks in recent years. To address this problem, several intrusion detection [10] [11] and pseudonym solutions [12] have been proposed. The method that uses pseudonyms when broadcasting security safety messages is now being widely accepted.…”
Section: Introductionmentioning
confidence: 99%