共 23 条
- [1] Song J., He G., Wang J., Zhang P., Shaping future low-carbon energy and transportation systems: Digital technologies and applications, iEnergy, 1, 3, pp. 285-305, (2022)
- [2] Ismailova Maxbuba, Alimukhamedova Nargiza, Potential Pitfalls of Data Fusion Digitalization in Microfinance Context, Fusion: Practice and Applications, 12, 2, pp. 98-108, (2023)
- [3] Lah O., Decarbonizing the transportation sector: policy options, synergies, and institutions to deliver on a low-carbon stabilization pathway, WIREs Energy Environ, 6, 6, (2017)
- [4] Osman Lobna, Taiwo Olutosin, Elashry Ahmed, Ezugwu Absalom E., Intelligent Edge Computing for IoT: Enhancing Security and Privacy, Journal of Intelligent Systems and Internet of Things, 8, 1, pp. 55-65, (2023)
- [5] Merkepci Mehmet, Abobala Mohammad, Security Model for Encrypting Uncertain Rational Data Units Based on Refined Neutrosophic Integers Fusion and El Gamal Algorithm, Fusion: Practice and Applications, 10, 2, pp. 35-41, (2023)
- [6] Qiao D., Et al., Toward safe carbon–neutral transportation: Battery internal short circuit diagnosis based on cloud data for electric vehicles, Appl. Energy, 317, (2022)
- [7] Alubady Raaid, shlaka Rawan A., Diame Hussein Alaa, Abdulkareem Sarah Ali, Hussam Ragheed, Yassine Sahar, Rajinikanth Venkatesan, Blockchain-based e-Medical Record and Data Security Service Management based on IoMT resource, Journal of Intelligent Systems and Internet of Things, 8, 2, pp. 86-100, (2023)
- [8] Guo L., Yang B., Ye J., Velni J. M., Song W., Attack-Resilient Lateral Stability Control for Four-Wheel-Driven EVs Considering Changed Driver Behavior Under Cyber Threats, IEEE Trans. Transp. Electrif, 8, 1, pp. 1362-1375, (2022)
- [9] Mohamed Ehab R., Mansour Heba M., El-Komy Osama M., An efficient fusion method for Protecting Software-Defined Networks Against ARP Attacks: Analysis and Experimental Validation, Fusion: Practice and Applications, 12, 1, pp. 08-23, (2023)
- [10] Diaz-Verdejo J., Munoz-Calle J., Estepa Alonso A., Estepa Alonso R., Madinabeitia G., On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks, Applied Sciences, 12, 2, (2022)