[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
Intrusion detection in the automotive domain: A comprehensive review
The automotive domain has realized amazing advancements in communication,
connectivity, and automation—and at a breakneck pace. Such advancements come with …
connectivity, and automation—and at a breakneck pace. Such advancements come with …
Secure operations of connected and autonomous vehicles
J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
A systematic survey of attack detection and prevention in connected and autonomous vehicles
The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in various
smart transportation services and applications, considering many benefits to society, people …
smart transportation services and applications, considering many benefits to society, people …
Cybersecurity knowledge graphs
LF Sikos - Knowledge and Information Systems, 2023 - Springer
Cybersecurity knowledge graphs, which represent cyber-knowledge with a graph-based
data model, provide holistic approaches for processing massive volumes of complex …
data model, provide holistic approaches for processing massive volumes of complex …
Federated graph neural network for fast anomaly detection in controller area networks
Due to the lack of CAN frame encryption and authentication, CAN bus is vulnerable to
various attacks, which can in general be divided into message injection, suspension, and …
various attacks, which can in general be divided into message injection, suspension, and …
Intrusion detection systems: A state-of-the-art taxonomy and survey
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …
of networks. These systems have the potential to identify and report deviations from normal …
[HTML][HTML] Security issues with in-vehicle networks, and enhanced countermeasures based on blockchain
Modern vehicles are no longer simply mechanical devices. Connectivity between the
vehicular network and the outside world has widened the security holes that hackers can …
vehicular network and the outside world has widened the security holes that hackers can …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
Intrusion, anomaly, and attack detection in smart vehicles
With the advancement of technology and Internet penetration in all aspects of life in today's
modern world, smart vehicles, particularly connected vehicles, are rising. As a result, as …
modern world, smart vehicles, particularly connected vehicles, are rising. As a result, as …