
Cybersecurity in Robotic Autonomous Vehicles
Machine Learning Applications to Detect Cyber Attacks
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybersecurity in Robotic Autonomous Vehicles
Machine Learning Applications to Detect Cyber Attacks
About this book
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation. It offers a pioneering intrusion detection model for AVs that uses machine and deep learning algorithms.
Presenting a new method for improving vehicle security, the book demonstrates how the IDS has incorporated machine learning and deep learning frameworks to analyse CAN bus traffic and identify the presence of any malicious activities in real time with high level of accuracy. It provides a comprehensive examination of the cybersecurity risks faced by AVs with a particular emphasis on CAN vulnerabilities and the innovative use of data prioritisation within CAN IDs.
The book will interest researchers and advanced undergraduate students taking courses in cybersecurity, automotive engineering, and data science. Automotive industry and robotics professionals focusing on Internet of Vehicles and cybersecurity will also benefit from the contents.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title
- Copyright
- Contents
- Preface
- About the Authors
- List of Figures
- List of Tables
- List of Abbreviations
- 1 Introduction
- 2 Theoretical Lens
- 3 Exploring CAN Bus Security: Insights and Analysis
- 4 Research Design
- 5 Results and Discussion
- 6 Conclusions and Future Research
- References
- Appendix
- Index