[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Attacks on self-driving cars and their countermeasures: A survey

A Chowdhury, G Karmakar, J Kamruzzaman… - IEEE …, 2020 - ieeexplore.ieee.org
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …

Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system

L Yin, J Xu, C Wang, Q Wang, F Zhou - Journal of Systems Architecture, 2023 - Elsevier
The in-vehicle voltage-based intrusion detection system (VIDS) can recognize the identity of
the ECUs and detect the physical layer attacks that cannot be detected by the content-based …

Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity

P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …

Machine learning based ecu detection for automotive security

A Hafeez, J Mohan, M Girdhar… - 2021 17th International …, 2021 - ieeexplore.ieee.org
Due to digital transformation, an autonomous vehi-cle (AV) is realized as a network of
multiple electronic control units (ECUs) for providing ubiquitous connectivity and control-ling …

Ecu identification using neural network classification and hyperparameter tuning

K Verma, M Girdhar, A Hafeez… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in
order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems …

Security analysis and improvement of vehicle Ethernet SOME/IP protocol

J Du, R Tang, T Feng - Sensors, 2022 - mdpi.com
The combination of in-vehicle networks and smart car devices has gradually developed into
Intelligent Connected Vehicles (ICVs). Through the vehicle security protocol, ICVs can …

Jitter-Based Authentication for Automotive Wireline Networks

S Lang, T Musah - IEEE Access, 2023 - ieeexplore.ieee.org
This paper proposes a new authentication approach targeted to wireline broadcast
communication systems for automotive and industrial applications. The proposed approach …

Enhancing Security in Cloud Computing Using Artificial Intelligence (AI)

D Stutz, JT de Assis, AA Laghari… - … Analytics and Cyber …, 2024 - Wiley Online Library
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …