Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti
{"title":"A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols","authors":"Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti","doi":"10.1109/comst.2024.3486367","DOIUrl":"https://doi.org/10.1109/comst.2024.3486367","url":null,"abstract":"","PeriodicalId":517382,"journal":{"name":"IEEE Communications Surveys & Tutorials","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luliang Jia, Nan Qi, Zhe Su, Feihuang Chu, Shengliang Fang, Kai-Kit Wong, Chan-Byoung Chae
{"title":"Game Theory and Reinforcement Learning for Anti-jamming Defense in Wireless Communications: Current Research, Challenges, and Solutions","authors":"Luliang Jia, Nan Qi, Zhe Su, Feihuang Chu, Shengliang Fang, Kai-Kit Wong, Chan-Byoung Chae","doi":"10.1109/comst.2024.3482973","DOIUrl":"https://doi.org/10.1109/comst.2024.3482973","url":null,"abstract":"","PeriodicalId":517382,"journal":{"name":"IEEE Communications Surveys & Tutorials","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamza Kheddar, Diana W. Dawoud, Ali Ismail Awad, Yassine Himeur, Muhammad Khurram Khan
{"title":"Reinforcement-Learning-Based Intrusion Detection in Communication Networks: A Review","authors":"Hamza Kheddar, Diana W. Dawoud, Ali Ismail Awad, Yassine Himeur, Muhammad Khurram Khan","doi":"10.1109/comst.2024.3484491","DOIUrl":"https://doi.org/10.1109/comst.2024.3484491","url":null,"abstract":"","PeriodicalId":517382,"journal":{"name":"IEEE Communications Surveys & Tutorials","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142487240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofei Wang, Yunfeng Zhao, Chao Qiu, Qinghua Hu, Victor C. M. Leung
{"title":"Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems","authors":"Xiaofei Wang, Yunfeng Zhao, Chao Qiu, Qinghua Hu, Victor C. M. Leung","doi":"10.1109/comst.2024.3482978","DOIUrl":"https://doi.org/10.1109/comst.2024.3482978","url":null,"abstract":"","PeriodicalId":517382,"journal":{"name":"IEEE Communications Surveys & Tutorials","volume":"79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}