Harnessing Fuzzing Capabilities to Improve Automotive Cybersecurity
Kunj Dhonde, Ikjot Saini and Mitra Mirhassani
Enhancing Security of Over-the-Air Updates in Connected and Autonomous Vehicles using Blockchain: Proof of Concept
Zeeman Memon and Ikjot Saini
Trust-centric Detection of Roadside Unit Misbehaviour in VANETs
Lavanya Nagaraju and Ikjot Saini
Machine Learning Approach to False Alert Attack Detection in Vehicular Adhoc Networks
Avinash Karhana, Ikjot Saini, Arunita Jaekel
A Comparative Survey on RSU Misbehaviour Detection in VANET
Lavanya Nagaraju and Ikjot Saini
A Comparative Survey of Blockchain-Based Security Mechanisms for Connected Vehicle OTA updates
Zeeman Memon and Ikjot Saini
Lightweight and Hybrid Approach for Detecting DoS Attacks in VANET
Arsalan Hameed and Ikjot Saini
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid, Arunita Jaekel, Ikjot Saini, Ning Zhang, Marc Kneppers
Comparative eco-efficiency assessment of cybersecurity solutions
John Akana, Bushra Marium Islam, Kartik Patel, Ikjot Saini, Gyan Chhipi-Shrestha, Rajeev Ruparathna
A Comprehensive Pseudonym Changing Scheme for Improving Location Privacy in Vehicular Networks
Ikjot Saini, Sherif Saad, and Arunita Jaekel
A Context Aware and Traffic Adaptive Privacy Scheme in VANETs
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Intelligent Adversary Placements for Privacy Evaluation in VANET
Ikjot Saini, Benjamin St. Amour, and Arunita Jaekel
Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain
Sonia Alice George, Arunita Jaekel, Ikjot Saini
Evaluating the effectiveness of pseudonym changing strategies for location privacy in VANET
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Traffic Density Based Distributed Congestion Control Strategy for Vehicular Communication
Oluwaseyi Akinlade, Ikjot Saini, Xiaofeng Liu and Arunita Jaekel
A comprehensive review of pseudonym changing strategies in vehicular networks
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Identifying vulnerabilities and attacking capabilities against pseudonym changing schemes in VANET
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Attacker placement for detecting vulnerabilities of pseudonym change strategies in VANET
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Speed Based Attacker Placement for Evaluating Location Privacy in VANET
Ikjot Saini, Sherif Saad, and Arunita Jaekel
Review of potential security attacks in VANET
Muhammad Anwar Shahid, Arunita Jaekel, Christie Ezeife, Qasim Al-Ajmi, Ikjot Saini