A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods

[1]  Xiaowei Wang Decision-Tree-Based Relay Selection in Dualhop Wireless Communications , 2019, IEEE Transactions on Vehicular Technology.

[2]  Philippe Castagliola,et al.  Measurement errors in statistical process monitoring: A literature review , 2017, Comput. Ind. Eng..

[3]  Honglong Chen,et al.  Dynamic Distributed Honeypot Based on Blockchain , 2019, IEEE Access.

[4]  Neeraj Bhargava,et al.  Decision Tree Analysis on J48 Algorithm for Data Mining , 2013 .

[5]  Christian Hennig,et al.  Comparing latent class and dissimilarity based clustering for mixed type variables with application to social stratification , 2010 .

[6]  Karen Scarfone,et al.  Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.

[7]  Syed S. H. Rizvi,et al.  A Threat to Vehicular Cyber Security and the Urgency for Correction , 2017 .

[8]  Sathya Prakash Kadhirvelan,et al.  Threat Modelling and Risk Assessment Within Vehicular Systems , 2014 .

[9]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[10]  Mauro Conti,et al.  Secure over-the-air software updates in connected vehicles: A survey , 2020, Comput. Networks.

[11]  Karsten Schmidt,et al.  Adapted Development Process for Security in Networked Automotive Systems , 2014 .

[12]  Y. Hardalupas,et al.  Anomalous heat transfer modes of nanofluids: a review based on statistical analysis , 2011, Nanoscale research letters.

[13]  Surbhi Sharma,et al.  A survey on internet of vehicles: Applications, security issues & solutions , 2019, Veh. Commun..

[14]  Walter Sebron,et al.  Safety & Security in the Context of Autonomous Driving , 2019, 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE).

[15]  Siti-Farhana Lokman,et al.  Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review , 2019, EURASIP J. Wirel. Commun. Netw..

[16]  Ali A. Ghorbani,et al.  Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.

[17]  Goutam Saha,et al.  Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey , 2019, Trans. Emerg. Telecommun. Technol..

[18]  Bruno Crispo,et al.  Security and privacy in vehicular communications: Challenges and opportunities , 2017, Veh. Commun..

[19]  Gergo Lodi,et al.  Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic , 2018, 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[20]  Florian Sommer,et al.  Survey and Classification of Automotive Security Attacks , 2019, Inf..

[21]  Elyes Ben Hamida,et al.  Adaptive Security for Intelligent Transport System Applications , 2018, IEEE Intelligent Transportation Systems Magazine.

[22]  Zsolt Szalay,et al.  A Novel Model Representation Framework for Cooperative Intelligent Transport Systems , 2019, Periodica Polytechnica Transportation Engineering.

[23]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[24]  Jiyoung Woo,et al.  In-vehicle network intrusion detection using deep convolutional neural network , 2020, Veh. Commun..

[25]  Sukumar Nandi,et al.  A tutorial survey on vehicular communication state of the art, and future research directions , 2019, Veh. Commun..

[26]  Máté Zöldy Legal Barriers of Utilization of Autonomous Vehicles as Part of Green Mobility , 2018, Proceedings of the 4th International Congress of Automotive and Transport Engineering (AMMA 2018).

[27]  Balázs Sághi,et al.  Development of a Novel Automotive Cybersecurity, Integrity Level, Framework , 2020 .

[28]  Jianfeng Ma,et al.  On the Security of the Canetti-Krawczyk Model , 2005, CIS.

[29]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[30]  Weidong Fang,et al.  BTDS: Bayesian‐based trust decision scheme for intelligent connected vehicles in VANETs , 2020, Trans. Emerg. Telecommun. Technol..

[31]  Cesar H. Comin,et al.  Clustering algorithms: A comparative approach , 2016, PloS one.

[32]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[33]  Chirag Gohel,et al.  Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory , 2016 .

[34]  Eric Armengaud,et al.  Threat and Risk Assessment Methodologies in the Automotive Domain , 2016, ANT/SEIT.