Ai-based intrusion detection systems for in-vehicle networks: A survey
The Controller Area Network (CAN) is the most widely used in-vehicle communication
protocol, which still lacks the implementation of suitable security mechanisms such as …
protocol, which still lacks the implementation of suitable security mechanisms such as …
In-vehicle communication cyber security: challenges and solutions
In-vehicle communication has become an integral part of today's driving environment
considering the growing add-ons of sensor-centric communication and computing devices …
considering the growing add-ons of sensor-centric communication and computing devices …
Milestones in autonomous driving and intelligent vehicles: Survey of surveys
Interest in autonomous driving (AD) and intelligent vehicles (IVs) is growing at a rapid pace
due to the convenience, safety, and economic benefits. Although a number of surveys have …
due to the convenience, safety, and economic benefits. Although a number of surveys have …
CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU
Controller area network (CAN) is a communication protocol that provides reliable and
productive transmission between in-vehicle nodes continuously. CAN bus protocol is …
productive transmission between in-vehicle nodes continuously. CAN bus protocol is …
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
This paper delves into the transformative role of machine learning (ML) techniques in
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …
Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems
Intelligent Transportation Systems (ITS), especially Autonomous Vehicles (AVs), are
vulnerable to security and safety issues that threaten the lives of the people. Unlike manual …
vulnerable to security and safety issues that threaten the lives of the people. Unlike manual …
Resource provisioning in edge/fog computing: A comprehensive and systematic review
A Shakarami, H Shakarami, M Ghobaei-Arani… - Journal of Systems …, 2022 - Elsevier
Close computing paradigms such as fog and edge have become promising technologies for
mobile applications running on pervasive mobile equipment utilized by a wide range of …
mobile applications running on pervasive mobile equipment utilized by a wide range of …
[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
Intrusion detection in the automotive domain: A comprehensive review
The automotive domain has realized amazing advancements in communication,
connectivity, and automation—and at a breakneck pace. Such advancements come with …
connectivity, and automation—and at a breakneck pace. Such advancements come with …
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic
A significant increase in the use of electronics control units (ECUs) in modern vehicles has
made controller area network (CAN) a de facto standard in the automotive industry. CAN …
made controller area network (CAN) a de facto standard in the automotive industry. CAN …