AlEisa et al., 2023 - Google Patents
Transforming transportation: Safe and secure vehicular communication and anomaly detection with intelligent cyber–physical system and deep learningAlEisa et al., 2023
- Document ID
- 4495447790942752789
- Author
- AlEisa H
- Alrowais F
- Allafi R
- Almalki N
- Faqih R
- Marzouk R
- Alnfiai M
- Motwakel A
- Ibrahim S
- Publication year
- Publication venue
- IEEE Transactions on Consumer Electronics
External Links
Snippet
Intelligent Cyber-Physical Transportation Systems (ICTS) rely deeply on data exchange between moving vehicles and fixed infrastructure. While exchanging data between vehicles in the network, security is a main constraint. ICTS encompasses many facilities and claims …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kabir et al. | Explainable artificial intelligence for smart city application: a secure and trusted platform | |
Abu Al‐Haija et al. | Boost‐Defence for resilient IoT networks: A head‐to‐toe approach | |
Rjoub et al. | A survey on explainable artificial intelligence for cybersecurity | |
Abdalzaher et al. | Toward secured iot-based smart systems using machine learning | |
AlEisa et al. | Transforming Transportation: Safe & Secure Vehicular Communication & Anomaly Detection with Intelligent Cyber-Physical System & Deep Learning | |
Sandeepa et al. | A survey on privacy for B5G/6G: New privacy challenges, and research directions | |
Haddaji et al. | Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey | |
Ali et al. | IoT network security using autoencoder deep neural network and channel access algorithm | |
Chakraborty et al. | Deep learning for situational understanding | |
Nagarajan et al. | Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey | |
Sivamohan et al. | TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization | |
Vignesh Saravanan et al. | Data protection and security enhancement in cyber-physical systems using AI and blockchain | |
Pethő et al. | A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods | |
Gore et al. | A Machine Learning-Based Detection of IoT Cyberattacks in Smart City Application | |
Abdel-Basset et al. | Deep Learning Techniques for IoT Security and Privacy | |
Tanaji et al. | BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles | |
Vaiyapuri et al. | Metaheuristics with federated learning enabled intrusion detection system in Internet of Things environment | |
Nandy et al. | A review of security attacks and intrusion detection in the vehicular networks | |
Mashaleh et al. | IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO. | |
Ryu et al. | Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning | |
Kalidoss et al. | An efficient model of enhanced optimization and dilated-GRU based secured multi-access edge computing with blockchain for VANET sector | |
Khan et al. | Securing IoT Devices Using Generative AI Techniques | |
Van der Heijden | Misbehavior detection in cooperative intelligent transport systems | |
McDaniel et al. | Artificial intelligence and cyber security: opportunities and challenges technical workshop summary report | |
Sasikala et al. | Decoding Decision-making: Embracing Explainable AI for Trust and Transparency |