A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
暂无分享,去创建一个
[1] Xiaowei Wang. Decision-Tree-Based Relay Selection in Dualhop Wireless Communications , 2019, IEEE Transactions on Vehicular Technology.
[2] Philippe Castagliola,et al. Measurement errors in statistical process monitoring: A literature review , 2017, Comput. Ind. Eng..
[3] Honglong Chen,et al. Dynamic Distributed Honeypot Based on Blockchain , 2019, IEEE Access.
[4] Neeraj Bhargava,et al. Decision Tree Analysis on J48 Algorithm for Data Mining , 2013 .
[5] Christian Hennig,et al. Comparing latent class and dissimilarity based clustering for mixed type variables with application to social stratification , 2010 .
[6] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[7] Syed S. H. Rizvi,et al. A Threat to Vehicular Cyber Security and the Urgency for Correction , 2017 .
[8] Sathya Prakash Kadhirvelan,et al. Threat Modelling and Risk Assessment Within Vehicular Systems , 2014 .
[9] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[10] Mauro Conti,et al. Secure over-the-air software updates in connected vehicles: A survey , 2020, Comput. Networks.
[11] Karsten Schmidt,et al. Adapted Development Process for Security in Networked Automotive Systems , 2014 .
[12] Y. Hardalupas,et al. Anomalous heat transfer modes of nanofluids: a review based on statistical analysis , 2011, Nanoscale research letters.
[13] Surbhi Sharma,et al. A survey on internet of vehicles: Applications, security issues & solutions , 2019, Veh. Commun..
[14] Walter Sebron,et al. Safety & Security in the Context of Autonomous Driving , 2019, 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE).
[15] Siti-Farhana Lokman,et al. Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review , 2019, EURASIP J. Wirel. Commun. Netw..
[16] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[17] Goutam Saha,et al. Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey , 2019, Trans. Emerg. Telecommun. Technol..
[18] Bruno Crispo,et al. Security and privacy in vehicular communications: Challenges and opportunities , 2017, Veh. Commun..
[19] Gergo Lodi,et al. Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic , 2018, 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[20] Florian Sommer,et al. Survey and Classification of Automotive Security Attacks , 2019, Inf..
[21] Elyes Ben Hamida,et al. Adaptive Security for Intelligent Transport System Applications , 2018, IEEE Intelligent Transportation Systems Magazine.
[22] Zsolt Szalay,et al. A Novel Model Representation Framework for Cooperative Intelligent Transport Systems , 2019, Periodica Polytechnica Transportation Engineering.
[23] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[24] Jiyoung Woo,et al. In-vehicle network intrusion detection using deep convolutional neural network , 2020, Veh. Commun..
[25] Sukumar Nandi,et al. A tutorial survey on vehicular communication state of the art, and future research directions , 2019, Veh. Commun..
[26] Máté Zöldy. Legal Barriers of Utilization of Autonomous Vehicles as Part of Green Mobility , 2018, Proceedings of the 4th International Congress of Automotive and Transport Engineering (AMMA 2018).
[27] Balázs Sághi,et al. Development of a Novel Automotive Cybersecurity, Integrity Level, Framework , 2020 .
[28] Jianfeng Ma,et al. On the Security of the Canetti-Krawczyk Model , 2005, CIS.
[29] Anna Romanou,et al. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..
[30] Weidong Fang,et al. BTDS: Bayesian‐based trust decision scheme for intelligent connected vehicles in VANETs , 2020, Trans. Emerg. Telecommun. Technol..
[31] Cesar H. Comin,et al. Clustering algorithms: A comparative approach , 2016, PloS one.
[32] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[33] Chirag Gohel,et al. Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory , 2016 .
[34] Eric Armengaud,et al. Threat and Risk Assessment Methodologies in the Automotive Domain , 2016, ANT/SEIT.