[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

AlEisa et al., 2023 - Google Patents

Transforming transportation: Safe and secure vehicular communication and anomaly detection with intelligent cyber–physical system and deep learning

AlEisa et al., 2023

Document ID
4495447790942752789
Author
AlEisa H
Alrowais F
Allafi R
Almalki N
Faqih R
Marzouk R
Alnfiai M
Motwakel A
Ibrahim S
Publication year
Publication venue
IEEE Transactions on Consumer Electronics

External Links

Snippet

Intelligent Cyber-Physical Transportation Systems (ICTS) rely deeply on data exchange between moving vehicles and fixed infrastructure. While exchanging data between vehicles in the network, security is a main constraint. ICTS encompasses many facilities and claims …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Kabir et al. Explainable artificial intelligence for smart city application: a secure and trusted platform
Abu Al‐Haija et al. Boost‐Defence for resilient IoT networks: A head‐to‐toe approach
Rjoub et al. A survey on explainable artificial intelligence for cybersecurity
Abdalzaher et al. Toward secured iot-based smart systems using machine learning
AlEisa et al. Transforming Transportation: Safe & Secure Vehicular Communication & Anomaly Detection with Intelligent Cyber-Physical System & Deep Learning
Sandeepa et al. A survey on privacy for B5G/6G: New privacy challenges, and research directions
Haddaji et al. Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey
Ali et al. IoT network security using autoencoder deep neural network and channel access algorithm
Chakraborty et al. Deep learning for situational understanding
Nagarajan et al. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Sivamohan et al. TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
Vignesh Saravanan et al. Data protection and security enhancement in cyber-physical systems using AI and blockchain
Pethő et al. A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
Gore et al. A Machine Learning-Based Detection of IoT Cyberattacks in Smart City Application
Abdel-Basset et al. Deep Learning Techniques for IoT Security and Privacy
Tanaji et al. BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles
Vaiyapuri et al. Metaheuristics with federated learning enabled intrusion detection system in Internet of Things environment
Nandy et al. A review of security attacks and intrusion detection in the vehicular networks
Mashaleh et al. IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO.
Ryu et al. Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning
Kalidoss et al. An efficient model of enhanced optimization and dilated-GRU based secured multi-access edge computing with blockchain for VANET sector
Khan et al. Securing IoT Devices Using Generative AI Techniques
Van der Heijden Misbehavior detection in cooperative intelligent transport systems
McDaniel et al. Artificial intelligence and cyber security: opportunities and challenges technical workshop summary report
Sasikala et al. Decoding Decision-making: Embracing Explainable AI for Trust and Transparency