[1] N. Aishwarya, N. G. Praveena, C. Karthikeyan, S. Priyanka, IoT enabled detection and notification system for
potholes and road cracks, Disruptive Technologies for Big Data and Cloud Applications. Lecture Notes in Electrical
Engineering, 905 (2022), 799-806.
https://link.springer.com/chapter/10.1007/978-981-19-2177-3_74
[2] A. Bhatia, K. Haribabu, K. Gupta, A. Sahu, Realization of flexible and scalable VANETs through SDN and virtualization,
International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, (2018), 280-282.
https://doi.org/10.1109/ICOIN.2018.8343125
[3] C. Chen, L. Liu, T. Qiu, D. O. Wu, Z. Ren, Delay-aware grid-based geographic routing in urban VANETs: A
backbone approach, IEEE/ACM Transactions on Networking, 27(6) (2019), 2324-2337. https://doi.org/10.1109/
TNET.2019.2944595
[4] M. Deveci, I. Gokasar, D. Pamucar, A. Alaa Zaidan, X.Wen, B. B. Gupta, Evaluation of cooperative intelligent transportation system scenarios for resilience in transportation using type-2 neutrosophic fuzzy VIKOR, Transportation
Research Part A: Policy and Practice, 173 (2023), 103666.
https://doi.org/10.1016/j.tra.2023.103666
[5] M. Deveci, D. Pamucar, I. Gokasar, M. K¨oppen, B. B. Gupta, Personal mobility in metaverse with autonomous
vehicles using Q-rung orthopair fuzzy sets based OPA-RAFSI model, IEEE Transactions on Intelligent Transportation
Systems, 24(12) (2023), 15642-15651.
https://doi.org/10.1109/TITS.2022.3186294
[7] X. Guo, Y. Chen, L. Cao, D. Zhang, Y. Jiang, A receiver-forwarding decision scheme based on Bayesian for NDNVANET,
China Communications, 17(8) (2020), 106-120.
https://doi.org/10.23919/JCC.2020.08.009
[8] M. Hashem Eiza, T. Owens, Q. Ni, Secure and robust multi-constrained QoS aware routing algorithm for VANETs,
IEEE Transactions on Dependable and Secure Computing, 13(1) (2016), 32-45. https://doi.org/10.1109/TDSC.
2014.2382602
[9] Z. Hassan, A. Mehmood, C. Maple, M. A. Khan, A. Aldegheishem, Intelligent detection of black hole attacks
for secure communication in autonomous and connected vehicles, IEEE Access, 8 (2020), 199618-199628. https:
//doi.org/10.1109/ACCESS.2020.3034327
[10] S. Hu, Y. Jia, C. She, Performance analysis of VANET routing protocols and implementation of a VANET terminal,
2017. International Conference on Computer Technology, Electronics and Communication (ICCTEC), Dalian, China,
(2017), 1248-1252.
https://doi.org/10.1109/ICCTEC.2017.00272
[12] R. Hussain, F. Abbas, J. Son, H. Eun, H. Oh, Privacy-aware route tracing and revocation games in VANET-based
clouds, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications
(WiMob), Lyon, France, (2013), 730-735.
https://doi.org/10.1109/WiMOB.2013.6673437
[13] R. Hussain, J. Son, H. Eun, S. Kim, H. Oh, Rethinking vehicular communications: Merging VANET with cloud
computing, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, Taipei,
Taiwan, (2012), 606-609.
https://doi.org/10.1109/CloudCom.2012.6427481
[14] K. Kandali, L. Bennis, H. Bennis, A new hybrid routing protocol using a modified K-means clustering algorithm
and continuous hopfield network for VANET, IEEE Access, 9 (2021), 47169-47183. https://doi.org/10.1109/
ACCESS.2021.3068074
[15] R. Kaur, T. P. Singh, V. Khajuria, Security issues in vehicular Ad-Hoc network (VANET), 2nd International
Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, (2018), 884-889. https://doi.
org/10.1109/ICOEI.2018.8553852
[16] P. S. Kumar, Computationally simple and efficient method for solving real-life mixed intuitionistic fuzzy 3D assignment problems, International Journal of Software Science and Computational Intelligence, 14(1) (2022), 1-42.
https://doi.org/10.4018/ijssci.291715
[17] K. Lakshmi Narayanan, R. Naresh, An efficient key validation mechanism with VANET in real time cloud monitoring
metrics to enhance cloud storage and security, Sustainable Energy Technologies and Assessments, 56 (2023),
102970.
https://doi.org/10.1016/j.seta.2022.102970
[18] Z. Onder, E. Savas, I. Canak, Some novel approaches on the (N, p, q) summability of double sequences of fuzzy
numbers and its applications, Iranian Journal of Fuzzy Systems, 20(6) (2023), 105-122. https://doi.org/10.
22111/ijfs.2023.44900.7922
[19] D. Prabakaran, H. Sathyapriya, A review on methodologies and performance analysis
of device identity masking techniques, International Journal of Scientific and Technical
Research, 8(12) (2019), 2018-2022.
https://www.ijstr.org/final-print/dec2019/A-Review-On-Methodologies-And-Performance-Analysis-Of-Device-Identity-Masking-Techniques.pdf
[21] M. Sayad Haghighi, Z. Aziminejad, Highly anonymous mobility-tolerant location-based onion routing for VANETs,
IEEE Internet of Things Journal, 7(4) (2020), 2582-2590.
https://doi.org/10.1109/JIOT.2019.2948315
[22] J. Shen, C. Wang, A. Castiglione, D. Liu, C. Esposito, Trustworthiness evaluation-based routing protocol for
incompletely predictable vehicular Ad Hoc networks, IEEE Transactions on Big Data, 8(1) (2022), 48-59. https:
//doi.org/10.1109/TBDATA.2017.2710347
[23] G. D. Singh, M. Prateek, S. Kumar, M. Verma, D. Singh, H. N. Lee, Hybrid genetic firefly algorithm-based routing
protocol for VANETs, IEEE Access, 10 (2022), 9142-9151.
https://doi.org/10.1109/ACCESS.2022.3142811
[24] M. Syfullah, J. M. Y. Lim, Data broadcasting on cloud-VANET for IEEE 802.11p and LTE hybrid VANET architectures,
3rd International Conference on Computational Intelligence and Communication Technology (CICT),
Ghaziabad, India, (2017), 1-6.
https://doi.org/10.1109/CIACT.2017.7977321
[26] P. Upadhyay, V. Marriboina, S. Kumar, S. Kumar, M. A. Shah, An enhanced hybrid glowworm swarm optimization
algorithm for traffic-aware vehicular networks, IEEE Access, 10 (2022), 110136-110148. https://doi.org/10.
1109/ACCESS.2022.3211653
[27] Y. Wang, X. Li, X. Zhang, X. Liu, J. Weng, ARPLR: An all-round and highly privacy-preserving location-based
routing scheme for VANETs, IEEE Transactions on Intelligent Transportation Systems, 23(9) (2022), 16558-16575.
https://doi.org/10.1109/TITS.2021.3134686
[28] Z. L. Yue, C. Yue, X. H. Peng, W.Wu, VIKOR-based group decision-making method for software quality assessment,
Iranian Journal of Fuzzy Systems, 20(1) (2023), 53-70.
https://doi.org/10.22111/ijfs.2023.7346
[29] A. P. Zabaleta, P. Fern´andez, J. F. Prados-Castillo, M. de Castro-Pardo, Constructing fuzzy composite indicators to
support water policy entrepreneurship, Sustainable Technology and Entrepreneurship, 1(3) (2022), 100022. https:
//doi.org/10.1016/j.stae.2022.100022
[30] S. S. Zalte, V. R. Ghorpade, R. K. Kamat, Synergizing blockchain, IoT, and AI with VANET for intelligent
transport solutions, Emerging Computing Paradigms: Principles, Advances and Applications, Wiley, (2022), 193-
210.
https://doi.org/10.1002/9781119813439.ch11
[31] J. Zhang, J. Wei, On the security of privacy-enhanced authentication protocol for federated learning in VANETs,
IEEE Transactions on Information Forensics and Security, 19 (2024), 9433-9435. https://doi.org/10.1109/TIFS.
2024.3445730