Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (837)

Search Parameters:
Keywords = traffic protection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1033 KiB  
Article
Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments
by Daniel Sernández-Iglesias, Llanos Tobarra, Rafael Pastor-Vargas, Antonio Robles-Gómez, Pedro Vidal-Balboa and João Sarraipa
Future Internet 2025, 17(8), 351; https://doi.org/10.3390/fi17080351 - 1 Aug 2025
Viewed by 181
Abstract
Rural regions face significant barriers to adopting IoT technologies, due to limited connectivity, energy constraints, and poor technical infrastructure. While urban environments benefit from advanced digital systems and cloud services, rural areas often lack the necessary conditions to deploy and evaluate secure and [...] Read more.
Rural regions face significant barriers to adopting IoT technologies, due to limited connectivity, energy constraints, and poor technical infrastructure. While urban environments benefit from advanced digital systems and cloud services, rural areas often lack the necessary conditions to deploy and evaluate secure and autonomous IoT solutions. To help overcome this gap, this paper presents the Smart Rural IoT Lab, a modular and reproducible testbed designed to replicate the deployment conditions in rural areas using open-source tools and affordable hardware. The laboratory integrates long-range and short-range communication technologies in six experimental scenarios, implementing protocols such as MQTT, HTTP, UDP, and CoAP. These scenarios simulate realistic rural use cases, including environmental monitoring, livestock tracking, infrastructure access control, and heritage site protection. Local data processing is achieved through containerized services like Node-RED, InfluxDB, MongoDB, and Grafana, ensuring complete autonomy, without dependence on cloud services. A key contribution of the laboratory is the generation of structured datasets from real network traffic captured with Tcpdump and preprocessed using Zeek. Unlike simulated datasets, the collected data reflect communication patterns generated from real devices. Although the current dataset only includes benign traffic, the platform is prepared for future incorporation of adversarial scenarios (spoofing, DoS) to support AI-based cybersecurity research. While experiments were conducted in an indoor controlled environment, the testbed architecture is portable and suitable for future outdoor deployment. The Smart Rural IoT Lab addresses a critical gap in current research infrastructure, providing a realistic and flexible foundation for developing secure, cloud-independent IoT solutions, contributing to the digital transformation of rural regions. Full article
Show Figures

Figure 1

19 pages, 950 KiB  
Article
How the Adoption of EVs in Developing Countries Can Be Effective: Indonesia’s Case
by Ida Nyoman Basmantra, Ngurah Keshawa Satya Santiarsa, Regina Dinanti Widodo and Caren Angellina Mimaki
World Electr. Veh. J. 2025, 16(8), 428; https://doi.org/10.3390/wevj16080428 - 1 Aug 2025
Viewed by 213
Abstract
Indonesia’s worsening air pollution and traffic emissions have thrust electric vehicles (EVs) into the spotlight, but what really drives Indonesians to make the switch? This study integrates Protection Motivation Theory with green branding and policy frameworks to explain electric vehicle (EV) adoption in [...] Read more.
Indonesia’s worsening air pollution and traffic emissions have thrust electric vehicles (EVs) into the spotlight, but what really drives Indonesians to make the switch? This study integrates Protection Motivation Theory with green branding and policy frameworks to explain electric vehicle (EV) adoption in Indonesia. Using a nationwide survey (n = 986) and partial-least-squares structural-equation modeling, we test how environmental awareness, consumer expectancy, threat appraisal, and coping appraisal shape adoption both directly and through green brand image (GBI), while perceived policy incentives moderate the GBI–adoption link. The model accounts for 54% of the variance in adoption intention. These findings highlight that combining public awareness campaigns, compelling green brand messaging, and carefully calibrated policy incentives is essential for accelerating Indonesia’s transition to cleaner transport. Full article
Show Figures

Figure 1

20 pages, 10603 KiB  
Article
A Safety-Based Approach for the Design of an Innovative Microvehicle
by Michelangelo-Santo Gulino, Susanna Papini, Giovanni Zonfrillo, Thomas Unger, Peter Miklis and Dario Vangi
Designs 2025, 9(4), 90; https://doi.org/10.3390/designs9040090 - 31 Jul 2025
Viewed by 168
Abstract
The growing popularity of Personal Light Electric Vehicles (PLEVs), such as e-scooters, has revolutionized urban mobility by offering compact, cost-effective, and environmentally friendly transportation solutions. However, safety concerns, including inadequate infrastructure, poor protective measures, and high accident rates, remain critical challenges. This paper [...] Read more.
The growing popularity of Personal Light Electric Vehicles (PLEVs), such as e-scooters, has revolutionized urban mobility by offering compact, cost-effective, and environmentally friendly transportation solutions. However, safety concerns, including inadequate infrastructure, poor protective measures, and high accident rates, remain critical challenges. This paper presents the design and development of an innovative self-balancing microvehicle under the H2020 LEONARDO project, which aims to address these challenges through advanced engineering and user-centric design. The vehicle combines features of monowheels and e-scooters, integrating cutting-edge technologies to enhance safety, stability, and usability. The design adheres to European regulations, including Germany’s eKFV standards, and incorporates user preferences identified through representative online surveys of 1500 PLEV users. These preferences include improved handling on uneven surfaces, enhanced signaling capabilities, and reduced instability during maneuvers. The prototype features a lightweight composite structure reinforced with carbon fibers, a high-torque motorized front wheel, and multiple speed modes tailored to different conditions, such as travel in pedestrian areas, use by novice riders, and advanced users. Braking tests demonstrate deceleration values of up to 3.5 m/s2, comparable to PLEV market standards and exceeding regulatory minimums, while smooth acceleration ramps ensure rider stability and safety. Additional features, such as identification plates and weight-dependent motor control, enhance compliance with local traffic rules and prevent misuse. The vehicle’s design also addresses common safety concerns, such as curb navigation and signaling, by incorporating large-diameter wheels, increased ground clearance, and electrically operated direction indicators. Future upgrades include the addition of a second rear wheel for enhanced stability, skateboard-like rear axle modifications for improved maneuverability, and hybrid supercapacitors to minimize fire risks and extend battery life. With its focus on safety, regulatory compliance, and rider-friendly innovations, this microvehicle represents a significant advancement in promoting safe and sustainable urban mobility. Full article
(This article belongs to the Section Vehicle Engineering Design)
Show Figures

Figure 1

36 pages, 25831 KiB  
Article
Identification of Cultural Landscapes and Spatial Distribution Characteristics in Traditional Villages of Three Gorges Reservoir Area
by Jia Jiang, Zhiliang Yu and Ende Yang
Buildings 2025, 15(15), 2663; https://doi.org/10.3390/buildings15152663 - 28 Jul 2025
Viewed by 335
Abstract
The Three Gorges Reservoir Area (TGRA) is an important ecological barrier and cultural intermingling zone in the upper reaches of the Yangtze River, and its traditional villages carry unique information about natural changes and civilisational development, but face the challenges of conservation and [...] Read more.
The Three Gorges Reservoir Area (TGRA) is an important ecological barrier and cultural intermingling zone in the upper reaches of the Yangtze River, and its traditional villages carry unique information about natural changes and civilisational development, but face the challenges of conservation and development under the impact of modernisation and ecological pressure. This study takes 112 traditional villages in the TGRA that have been included in the protection list as the research objects, aiming to construct a cultural landscape identification framework for the traditional villages in the TGRA. Through field surveys, landscape feature assessments, GIS spatial analysis, and multi-source data analysis, we systematically analyse their cultural landscape type systems and spatial differentiation characteristics, and then reveal their cultural landscape types and spatial differentiation patterns. (1) The results of the study show that the spatial distribution of traditional villages exhibits significant altitude gradient differentiation—the low-altitude area is dominated by traffic and trade villages, the middle-altitude area is dominated by patriarchal manor villages and mountain farming villages, and the high-altitude area is dominated by ethno-cultural and ecologically dependent villages. (2) Slope and direction analyses further reveal that the gently sloping areas are conducive to the development of commercial and agricultural settlements, while the steeply sloping areas strengthen the function of ethnic and cultural defence. The results indicate that topographic conditions drive the synergistic evolution of the human–land system in traditional villages through the mechanisms of agricultural optimisation, trade networks, cultural defence, and ecological adaptation. The study provides a paradigm of “nature–humanities” interaction analysis for the conservation and development of traditional villages in mountainous areas, which is of practical value in coordinating the construction of ecological barriers and the revitalisation of villages in the reservoir area. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

22 pages, 1411 KiB  
Article
MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT
by Jian Tang, Zhao Huang and Chunqiang Li
Future Internet 2025, 17(8), 323; https://doi.org/10.3390/fi17080323 - 23 Jul 2025
Viewed by 280
Abstract
The rising frequency of network intrusions has significantly impacted critical infrastructures, leading to an increased focus on the detection of malicious network traffic in recent years. However, traditional port-based and classical machine learning-based malicious network traffic detection methods suffer from a dependence on [...] Read more.
The rising frequency of network intrusions has significantly impacted critical infrastructures, leading to an increased focus on the detection of malicious network traffic in recent years. However, traditional port-based and classical machine learning-based malicious network traffic detection methods suffer from a dependence on expert experience and limited generalizability. In this paper, we propose a malicious traffic detection method based on an efficient federated learning framework of Bidirectional Encoder Representations from Transformers (BERT), called MT-FBERT. It offers two major advantages over most existing approaches. First, MT-FBERT pretrains BERT using two pre-training tasks along with an overall pre-training loss on large-scale unlabeled network traffic, allowing the model to automatically learn generalized traffic representations, which do not require human experience to extract the behavior features or label the malicious samples. Second, MT-FBERT finetunes BERT for malicious network traffic detection through an efficient federated learning framework, which both protects the data privacy of critical infrastructures and reduces resource consumption by dynamically identifying and updating only the most significant neurons in the global model. Evaluation experiments on public datasets demonstrated that MT-FBERT outperforms state-of-the-art baselines in malicious network traffic detection. Full article
Show Figures

Figure 1

21 pages, 1672 KiB  
Article
TSE-APT: An APT Attack-Detection Method Based on Time-Series and Ensemble-Learning Models
by Mingyue Cheng, Ga Xiang, Qunsheng Yang, Zhixing Ma and Haoyang Zhang
Electronics 2025, 14(15), 2924; https://doi.org/10.3390/electronics14152924 - 22 Jul 2025
Viewed by 288
Abstract
Advanced Persistent Threat (APT) attacks pose a serious challenge to traditional detection methods. These methods often suffer from high false-alarm rates and limited accuracy due to the multi-stage and covert nature of APT attacks. In this paper, we propose TSE-APT, a time-series ensemble [...] Read more.
Advanced Persistent Threat (APT) attacks pose a serious challenge to traditional detection methods. These methods often suffer from high false-alarm rates and limited accuracy due to the multi-stage and covert nature of APT attacks. In this paper, we propose TSE-APT, a time-series ensemble model that addresses these two limitations. It combines multiple machine-learning models, such as Random Forest (RF), Multi-Layer Perceptron (MLP), and Bidirectional Long Short-Term Memory Network (BiLSTM) models, to dynamically capture correlations between multiple stages of the attack process based on time-series features. It discovers hidden features through the integration of multiple machine-learning models to significantly improve the accuracy and robustness of APT detection. First, we extract a collection of dynamic time-series features such as traffic mean, flow duration, and flag frequency. We fuse them with static contextual features, including the port service matrix and protocol type distribution, to effectively capture the multi-stage behaviors of APT attacks. Then, we utilize an ensemble-learning model with a dynamic weight-allocation mechanism using a self-attention network to adaptively adjust the sub-model contribution. The experiments showed that using time-series feature fusion significantly enhanced the detection performance. The RF, MLP, and BiLSTM models achieved 96.7% accuracy, considerably enhancing recall and the false positive rate. The adaptive mechanism optimizes the model’s performance and reduces false-alarm rates. This study provides an analytical method for APT attack detection, considering both temporal dynamics and context static characteristics, and provides new ideas for security protection in complex networks. Full article
(This article belongs to the Special Issue AI in Cybersecurity, 2nd Edition)
Show Figures

Figure 1

18 pages, 2549 KiB  
Article
A Multi-Fusion Early Warning Method for Vehicle–Pedestrian Collision Risk at Unsignalized Intersections
by Weijing Zhu, Junji Dai, Xiaoqin Zhou, Xu Gao, Rui Cheng, Bingheng Yang, Enchu Li, Qingmei Lü, Wenting Wang and Qiuyan Tan
World Electr. Veh. J. 2025, 16(7), 407; https://doi.org/10.3390/wevj16070407 - 21 Jul 2025
Viewed by 312
Abstract
Traditional collision risk warning methods primarily focus on vehicle-to-vehicle collisions, neglecting conflicts between vehicles and vulnerable road users (VRUs) such as pedestrians, while the difficulty in predicting pedestrian trajectories further limits the accuracy of collision warnings. To address this problem, this study proposes [...] Read more.
Traditional collision risk warning methods primarily focus on vehicle-to-vehicle collisions, neglecting conflicts between vehicles and vulnerable road users (VRUs) such as pedestrians, while the difficulty in predicting pedestrian trajectories further limits the accuracy of collision warnings. To address this problem, this study proposes a vehicle-to-everything-based (V2X) multi-fusion vehicle–pedestrian collision warning method, aiming to enhance the traffic safety protection for VRUs. First, Unmanned Aerial Vehicle aerial imagery combined with the YOLOv7 and DeepSort algorithms is utilized to achieve target detection and tracking at unsignalized intersections, thereby constructing a vehicle–pedestrian interaction trajectory dataset. Subsequently, key foundational modules for collision warning are developed, including the vehicle trajectory module, the pedestrian trajectory module, and the risk detection module. The vehicle trajectory module is based on a kinematic model, while the pedestrian trajectory module adopts an Attention-based Social GAN (AS-GAN) model that integrates a generative adversarial network with a soft attention mechanism, enhancing prediction accuracy through a dual-discriminator strategy involving adversarial loss and displacement loss. The risk detection module applies an elliptical buffer zone algorithm to perform dynamic spatial collision determination. Finally, a collision warning framework based on the Monte Carlo (MC) method is developed. Multiple sampled pedestrian trajectories are generated by applying Gaussian perturbations to the predicted mean trajectory and combined with vehicle trajectories and collision determination results to identify potential collision targets. Furthermore, the driver perception–braking time (TTM) is incorporated to estimate the joint collision probability and assist in warning decision-making. Simulation results show that the proposed warning method achieves an accuracy of 94.5% at unsignalized intersections, outperforming traditional Time-to-Collision (TTC) and braking distance models, and effectively reducing missed and false warnings, thereby improving pedestrian traffic safety at unsignalized intersections. Full article
Show Figures

Figure 1

19 pages, 626 KiB  
Article
A Strong Anonymous Privacy Protection Authentication Scheme Based on Certificateless IOVs
by Xiaohu He, Shan Gao, Hua Wang and Chuyan Wang
Symmetry 2025, 17(7), 1163; https://doi.org/10.3390/sym17071163 - 21 Jul 2025
Viewed by 175
Abstract
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing [...] Read more.
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing anonymous authentication schemes have limitations, including large vehicle storage demands, information redundancy, time-dependent pseudonym updates, and public–private key updates coupled with pseudonym changes. To address these issues, we propose a certificateless strong anonymous privacy protection authentication scheme that allows vehicles to autonomously generate and dynamically update pseudonyms. Additionally, the trusted authority transmits each entity’s partial private key via a session key, eliminating reliance on secure channels during transmission. Based on the elliptic curve discrete logarithm problem, the scheme’s existential unforgeability is proven in the random oracle model. Performance analysis shows that it outperforms existing schemes in computational cost and communication overhead, with the total computational cost reduced by 70.29–91.18% and communication overhead reduced by 27.75–82.55%, making it more suitable for privacy-sensitive and delay-critical IoV environments. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

16 pages, 6248 KiB  
Article
Global Hotspots of Whale–Ship Collision Risk: A Multi-Species Framework Integrating Critical Habitat Zonation and Shipping Pressure for Conservation Prioritization
by Bei Wang, Linlin Zhao, Tong Lu, Linjie Li, Tingting Li, Bailin Cong and Shenghao Liu
Animals 2025, 15(14), 2144; https://doi.org/10.3390/ani15142144 - 20 Jul 2025
Viewed by 689
Abstract
The expansion of global maritime activities threatens marine ecosystems and biodiversity. Collisions between ships and marine megafauna profoundly impact vulnerable species such as whales, who serve as keystone predators. However, the specific regions most heavily affected by shipping traffic and the multi-species facing [...] Read more.
The expansion of global maritime activities threatens marine ecosystems and biodiversity. Collisions between ships and marine megafauna profoundly impact vulnerable species such as whales, who serve as keystone predators. However, the specific regions most heavily affected by shipping traffic and the multi-species facing collision risk remain poorly understood. Here, we analyzed global shipping data to assess the distribution of areas with high shipping pressure and identify global hotspots for whale–ship collisions. The results reveal that high-pressure habitats are primarily distributed within exclusive economic zones (EEZs), which are generally consistent with the distribution of collision hotspots. High-pressure habitats exhibit significant spatial mismatch: 32.9% of Marine Protected Areas endure high shipping stress and yet occupy merely 1.25% of protected ocean area. Additionally, 25.1% of collision hotspots (top 1% risk) affect four or more whale species, forming critical aggregation in regions like the Gulf of St. Lawrence and Northeast Asian marginal seas. Most of these high-risk areas lack protective measures. These findings offer actionable spatial priorities for implementing targeted conservation strategies, such as the introduction of mandatory speed restrictions and dynamic vessel routing in high-risk, multi-species hotspots. By focusing on critical aggregation areas, these strategies will help mitigate whale mortality and enhance marine biodiversity protection, supporting the sustainable coexistence of maritime activities with vulnerable marine megafauna. Full article
(This article belongs to the Section Ecology and Conservation)
Show Figures

Figure 1

23 pages, 1631 KiB  
Article
Detecting Malicious Anomalies in Heavy-Duty Vehicular Networks Using Long Short-Term Memory Models
by Mark J. Potvin and Sylvain P. Leblanc
Sensors 2025, 25(14), 4430; https://doi.org/10.3390/s25144430 - 16 Jul 2025
Cited by 1 | Viewed by 388
Abstract
Utilizing deep learning models to detect malicious anomalies within the traffic of application layer J1939 protocol networks, found on heavy-duty commercial vehicles, is becoming a critical area of research in platform protection. At the physical layer, the controller area network (CAN) bus is [...] Read more.
Utilizing deep learning models to detect malicious anomalies within the traffic of application layer J1939 protocol networks, found on heavy-duty commercial vehicles, is becoming a critical area of research in platform protection. At the physical layer, the controller area network (CAN) bus is the backbone network for most vehicles. The CAN bus is highly efficient and dependable, which makes it a suitable networking solution for automobiles where reaction time and speed are of the essence due to safety considerations. Much recent research has been conducted on securing the CAN bus explicitly; however, the importance of protecting the J1939 protocol is becoming apparent. Our research utilizes long short-term memory models to predict the next binary data sequence of a J1939 packet. Our primary objective is to compare the performance of our J1939 detection system trained on data sub-fields against a published CAN system trained on the full data payload. We conducted a series of experiments to evaluate both detection systems by utilizing a simulated attack representation to generate anomalies. We show that both detection systems outperform one another on a case-by-case basis and determine that there is a clear requirement for a multifaceted security approach for vehicular networks. Full article
Show Figures

Figure 1

47 pages, 1040 KiB  
Systematic Review
Impact of EU Regulations on AI Adoption in Smart City Solutions: A Review of Regulatory Barriers, Technological Challenges, and Societal Benefits
by Bo Nørregaard Jørgensen and Zheng Grace Ma
Information 2025, 16(7), 568; https://doi.org/10.3390/info16070568 - 2 Jul 2025
Viewed by 1143
Abstract
This review investigates the influence of European Union regulations on the adoption of artificial intelligence in smart city solutions, with a structured emphasis on regulatory barriers, technological challenges, and societal benefits. It offers a comprehensive analysis of the legal frameworks in effect by [...] Read more.
This review investigates the influence of European Union regulations on the adoption of artificial intelligence in smart city solutions, with a structured emphasis on regulatory barriers, technological challenges, and societal benefits. It offers a comprehensive analysis of the legal frameworks in effect by 2025, including the Artificial Intelligence Act, General Data Protection Regulation, Data Act, and sector-specific directives governing mobility, energy, and surveillance. This study critically assesses how these regulations affect the deployment of AI systems across urban domains such as traffic optimization, public safety, waste management, and energy efficiency. A comparative analysis of regulatory environments in the United States and China reveals differing governance models and their implications for innovation, safety, citizen trust, and international competitiveness. The review concludes that although the European Union’s focus on ethics and accountability establishes a solid basis for trustworthy artificial intelligence, the complexity and associated compliance costs create substantial barriers to adoption. It offers recommendations for policymakers, municipal authorities, and technology developers to align regulatory compliance with effective innovation in the context of urban digital transformation. Full article
(This article belongs to the Special Issue Artificial Intelligence and Data Science for Smart Cities)
Show Figures

Figure 1

33 pages, 1710 KiB  
Systematic Review
Promoting Sustainable Transport: A Systematic Review of Walking and Cycling Adoption Using the COM-B Model
by Hisham Y. Makahleh, Madhar M. Taamneh and Dilum Dissanayake
Future Transp. 2025, 5(3), 79; https://doi.org/10.3390/futuretransp5030079 - 1 Jul 2025
Viewed by 981
Abstract
Walking and cycling, as active modes of transportation, play a vital role in advancing sustainable urban mobility by reducing emissions and improving public health. However, widespread adoption faces challenges such as inadequate infrastructure, safety concerns, socio-cultural barriers, and policy limitations. This study systematically [...] Read more.
Walking and cycling, as active modes of transportation, play a vital role in advancing sustainable urban mobility by reducing emissions and improving public health. However, widespread adoption faces challenges such as inadequate infrastructure, safety concerns, socio-cultural barriers, and policy limitations. This study systematically reviewed 56 peer-reviewed articles from 2004 to 2024, across 30 countries across five continents, employing the Capability, Opportunity and Motivation-Behaviour (COM-B) framework to identify the main drivers of walking and cycling behaviours. Findings highlight that the lack of dedicated infrastructure, inadequate enforcement of road safety measures, personal and traffic safety concerns, and social stigmas collectively hinder active mobility. Strategic interventions such as developing integrated cycling networks, financial incentives, urban planning initiatives, and behavioural change programs have promoted increased engagement in walking and cycling. Enhancing urban mobility further requires investment in pedestrian and cycling infrastructure, improved integration with public transportation, the implementation of traffic-calming measures, and public education campaigns. Post-pandemic initiatives to establish new pedestrian and cycling spaces offer a unique opportunity to establish enduring changes that support active transportation. The study suggests expanding protected cycling lanes and integrating pedestrian pathways with public transit systems to strengthen safety and accessibility. Additionally, leveraging digital tools can enhance mobility planning and coordination. Future research is needed to explore the potential of artificial intelligence in enhancing mobility analysis, supporting the development of climate-resilient infrastructure, and informing transport policies that integrate gender perspectives to better understand long-term behavioural changes. Coordinated policy efforts and targeted investments can lead to more equitable transportation access, support sustainability goals, and alleviate urban traffic congestion. Full article
Show Figures

Figure 1

30 pages, 9859 KiB  
Article
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
by Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado and Mauricio Loachamín-Valencia
Future Internet 2025, 17(7), 284; https://doi.org/10.3390/fi17070284 - 26 Jun 2025
Viewed by 412
Abstract
This study presents a system for automatic cookie collection using bots that simulate user browsing behavior. Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. The infrastructure included an Ubuntu server [...] Read more.
This study presents a system for automatic cookie collection using bots that simulate user browsing behavior. Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. The infrastructure included an Ubuntu server with PiHole and Tshark services, facilitating cookie classification and association with third-party advertising and tracking networks. The BotSoul algorithm automated navigation, analyzing 440,000 URLs over 10.9 days with uninterrupted bot operation. The collected data established relationships between visited domains, generated cookies, and captured traffic, providing a solid foundation for security and privacy analysis. Machine learning models were developed to classify suspicious web domains and predict their vulnerability to XSS attacks. Additionally, clustering algorithms enabled user segmentation based on cookie data, identification of behavioral patterns, enhanced personalized web recommendations, and browsing experience optimization. The results highlight the system’s effectiveness in detecting security threats and improving navigation through adaptive recommendations. This research marks a significant advancement in web security and privacy, laying the groundwork for future improvements in protecting user information. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

22 pages, 3106 KiB  
Article
Confidential Intelligent Traffic Light Control System: Prevention of Unauthorized Traceability
by Ahmad Audat, Maram Bani Younes, Marah Yahia and Said Ghoul
Big Data Cogn. Comput. 2025, 9(7), 169; https://doi.org/10.3390/bdcc9070169 - 26 Jun 2025
Viewed by 491
Abstract
Many research studies have designed intelligent traffic light scheduling algorithms. Some researchers rely on specialized sensors and hardware to gather real-time traffic data at signalized road intersections. Others benefit from artificial intelligence techniques and/or cloud computing technologies. The technology of vehicular networks has [...] Read more.
Many research studies have designed intelligent traffic light scheduling algorithms. Some researchers rely on specialized sensors and hardware to gather real-time traffic data at signalized road intersections. Others benefit from artificial intelligence techniques and/or cloud computing technologies. The technology of vehicular networks has been widely used to gather the traffic characteristics of competing traffic flows at signalized road intersections. Intelligent traffic light controlling systems aim to fairly liberate competing traffic at signalized road intersections and eliminate traffic crises. These algorithms have been initially developed without focusing on the consequences of security threats or attacks. However, the accuracy of gathered traffic data at each road intersection affects its performance. Fake and corrupted packets highly affect the accuracy of the gathered traffic data. Thus, in this work, we aim to investigate the aspects of security and confidentiality of intelligent traffic light systems. The possible attacks on the confidentiality of intelligent traffic light systems are examined. Then, a confidential traffic light control system that protects the privacy of traveling vehicles and drivers is presented. The proposed algorithm mainly prevents unauthorized traceability and linkability attacks that threaten people’s lives and violate their privacy. Finally, the proposed algorithm is evaluated through extensive experiments to verify its correctness and benefits compared to traditional insecure intelligent traffic light systems. Full article
(This article belongs to the Special Issue Advances in Intelligent Defense Systems for the Internet of Things)
Show Figures

Figure 1

18 pages, 826 KiB  
Article
An Intrusion Detection System for the CAN Bus Based on Locality-Sensitive Hashing
by Yun Cai, Jinxin Zuo, Mingrui Fan, Chengye Zhao and Yueming Lu
Electronics 2025, 14(13), 2572; https://doi.org/10.3390/electronics14132572 - 26 Jun 2025
Viewed by 453
Abstract
As the Internet of Vehicles (IoV) rapidly gains popularity, the Controller Area Network (CAN) faces increasingly severe security threats. Most of the existing research on protecting the CAN bus has been based on artificial intelligence models, which require complex feature extraction and training [...] Read more.
As the Internet of Vehicles (IoV) rapidly gains popularity, the Controller Area Network (CAN) faces increasingly severe security threats. Most of the existing research on protecting the CAN bus has been based on artificial intelligence models, which require complex feature extraction and training processes and are too resource-intensive for deployment in resource-constrained CAN environments. To address these challenges, we propose a lightweight intrusion detection system based on locality-sensitive hashing that achieves efficient security protection without relying on complex machine learning and deep learning frameworks. We employ the Nilsimsa algorithm to compute hash digests of the data, using the similarity scores of these digests as anomaly scores to identify abnormal traffic. Evaluations show that our method achieves an accuracy of 98%, and tests of the system’s overhead confirm its suitability for deployment in resource-limited CAN scenarios. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

Back to TopTop