Matches in SemOpenAlex for { <https://semopenalex.org/work/W4310367760> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W4310367760 endingPage "215" @default.
- W4310367760 startingPage "203" @default.
- W4310367760 abstract "The previous system is driverless machines that take appropriate recommendations in all situations. They have transformed the conveyor system. The operations rely on sensed information and simulated knowledge to understand and reach conclusions concerning transportation operation, and to accommodate to improving circumstances. The method protection happens in three steps. Before the strikes occur, associated companies and businesses require determining class of advances that are liable to occur and their moderation practices. When the crimes occur, the operation should observe the complete CAV, and recognize initiatives. After raids follow, the method should respond to crimes appropriately and be capable to retrieve from seizures. The recommended UML-based CAV cyber protection structure is produced to determine the connections among each element and the construction in the CAV. Confined information has couple of sources. They contain device and software knowledge in the CAV frame. They have the running status info of appliance and programs. The Hardware section is the detector info obtained from the carrier enclosing by several CAV sensing devices. The program group has limited information assembled by the programs in CAVs. The surface course comprises information collected from other items. As each object has its own ID saved in its restricted knowledge, the visible details need this learning to support the testimony of the evidence source. After recognizing the transmitted ID, communications are classified into either individual stating that information is governed properly. The carriers or foundations need to transfer hidden knowledge. It can be obtained by distinct users and collected in the safe location. The generalized category stocks information that everyone could obtain. The knowledge processing course has four essential data computation methodologies. The generating component accumulates knowledge from various origins. These datasets need to be formatted, organized and combined for computation. The Processing group computes the information, including cleaning or annotating the data for analysis. The Verification class includes components that make sure the data are secure, fulfilling the cyber security requirements of the CAV system. The recommended system has additional databases to take of the different kinds of assaults in the system. The reliability is increased by 7.32% and time taken to overcome an attack is decreased by 11.59% compared to the previous one." @default.
- W4310367760 created "2022-12-09" @default.
- W4310367760 creator A5020523786 @default.
- W4310367760 date "2022-11-29" @default.
- W4310367760 modified "2023-09-26" @default.
- W4310367760 title "Reliable Machine Learning‐Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles" @default.
- W4310367760 cites W2001152389 @default.
- W4310367760 cites W2085279009 @default.
- W4310367760 cites W2284268886 @default.
- W4310367760 cites W2517726731 @default.
- W4310367760 cites W2960424705 @default.
- W4310367760 cites W2990899218 @default.
- W4310367760 cites W3005475813 @default.
- W4310367760 cites W3026549821 @default.
- W4310367760 cites W3039804934 @default.
- W4310367760 cites W3048207230 @default.
- W4310367760 cites W3129007523 @default.
- W4310367760 cites W3136416366 @default.
- W4310367760 cites W4205475721 @default.
- W4310367760 cites W4240035482 @default.
- W4310367760 doi "https://doi.org/10.1002/9781119871989.ch11" @default.
- W4310367760 hasPublicationYear "2022" @default.
- W4310367760 type Work @default.
- W4310367760 citedByCount "0" @default.
- W4310367760 crossrefType "other" @default.
- W4310367760 hasAuthorship W4310367760A5020523786 @default.
- W4310367760 hasConcept C107457646 @default.
- W4310367760 hasConcept C111919701 @default.
- W4310367760 hasConcept C126042441 @default.
- W4310367760 hasConcept C154945302 @default.
- W4310367760 hasConcept C199360897 @default.
- W4310367760 hasConcept C2777212361 @default.
- W4310367760 hasConcept C2777904410 @default.
- W4310367760 hasConcept C2780129039 @default.
- W4310367760 hasConcept C2781238097 @default.
- W4310367760 hasConcept C38652104 @default.
- W4310367760 hasConcept C41008148 @default.
- W4310367760 hasConcept C76155785 @default.
- W4310367760 hasConceptScore W4310367760C107457646 @default.
- W4310367760 hasConceptScore W4310367760C111919701 @default.
- W4310367760 hasConceptScore W4310367760C126042441 @default.
- W4310367760 hasConceptScore W4310367760C154945302 @default.
- W4310367760 hasConceptScore W4310367760C199360897 @default.
- W4310367760 hasConceptScore W4310367760C2777212361 @default.
- W4310367760 hasConceptScore W4310367760C2777904410 @default.
- W4310367760 hasConceptScore W4310367760C2780129039 @default.
- W4310367760 hasConceptScore W4310367760C2781238097 @default.
- W4310367760 hasConceptScore W4310367760C38652104 @default.
- W4310367760 hasConceptScore W4310367760C41008148 @default.
- W4310367760 hasConceptScore W4310367760C76155785 @default.
- W4310367760 hasLocation W43103677601 @default.
- W4310367760 hasOpenAccess W4310367760 @default.
- W4310367760 hasPrimaryLocation W43103677601 @default.
- W4310367760 hasRelatedWork W1998320603 @default.
- W4310367760 hasRelatedWork W2146884391 @default.
- W4310367760 hasRelatedWork W2369067071 @default.
- W4310367760 hasRelatedWork W2372895414 @default.
- W4310367760 hasRelatedWork W2373012867 @default.
- W4310367760 hasRelatedWork W2373884999 @default.
- W4310367760 hasRelatedWork W2383325303 @default.
- W4310367760 hasRelatedWork W2390261592 @default.
- W4310367760 hasRelatedWork W2394044507 @default.
- W4310367760 hasRelatedWork W648791420 @default.
- W4310367760 isParatext "false" @default.
- W4310367760 isRetracted "false" @default.
- W4310367760 workType "other" @default.