49450  | 0.932 | Kong S.; Wang K.; Feng C.; Wang J. | Smart Cities And Transportation Based Vehicle-To-Vehicle Communication And Cyber Security Analysis Using Machine Learning Model In 6G Network | Wireless Personal Communications (2024) |
31055  | 0.918 | Gul B.; Ertam F. | In-Vehicle Communication Cyber Security: A Comprehensive Review Of Challenges And Solutions | Vehicular Communications, 50 (2024) |
58842  | 0.917 | Aleisa H.N.; Alrowais F.; Allafi R.; Almalki N.S.; Faqih R.; Marzouk R.; Alnfiai M.M.; Motwakel A.; Ibrahim S.S. | Transforming Transportation: Safe And Secure Vehicular Communication And Anomaly Detection With Intelligent Cyber-Physical System And Deep Learning | IEEE Transactions on Consumer Electronics, 70, 1 (2024) |
47976  | 0.892 | Alsulami A.A.; Al-Haija Q.A.; Alturki B.; Alqahtani A.; Alsini R. | Security Strategy For Autonomous Vehicle Cyber-Physical Systems Using Transfer Learning | Journal of Cloud Computing, 12, 1 (2023) |
30072  | 0.889 | Abdallah E.E.; Aloqaily A.; Fayez H. | Identifying Intrusion Attempts On Connected And Autonomous Vehicles: A Survey | Procedia Computer Science, 220 (2023) |
44548  | 0.885 | Bangui H.; Buhnova B. | Recent Advances In Machine-Learning Driven Intrusion Detection In Transportation: Survey | Procedia Computer Science, 184 (2021) |
17013  | 0.885 | Aurangzeb S.; Aleem M.; Khan M.T.; Anwar H.; Siddique M.S. | Cybersecurity For Autonomous Vehicles Against Malware Attacks In Smart-Cities | Cluster Computing, 27, 3 (2024) |
37140  | 0.883 | Alkhudhayr H.; Ardah H. | Mitigating Cyberphysical Risks In Iot-Enabled Smart Transport Infrastructure | Journal of Supercomputing, 81, 2 (2025) |
47824  | 0.881 | Chowdhury N.M.I.; Hasan R. | Security Analysis Of Connected Autonomous Vehicles (Cavs): Challenges, Issues, Defenses, And Open Problems | Proceedings - 2024 IEEE World Forum on Public Safety Technology, WFPST 2024 (2024) |
8914  | 0.88 | Chowdhury N.M.I.; Hoque M.A.; Hasan R. | An Overview Of Cyber Attacks And Defenses On Intelligent Connected Vehicles | Computer and Information Security Handbook, Fourth Edition: Volumes 1-2, 2 (2024) |