Filters








991 Hits in 7.5 sec

Table of Contents

2020 IEEE Transactions on Vehicular Technology  
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  A. M. Elbir and A. K.  ...  Uthansakul, and A. A.  ... 
doi:10.1109/tvt.2019.2961921 fatcat:5hwiwrq6hbekpnzaciuur7dvom

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
In [118] , Manganaris et al. use Frequent Episode Rules (FER) [119] [120] to create profiles from non-intrusion periods.  ...  Formally, Y is such that for A and B V, with A ≠ B. The third episode Z, from the figure, is called non-parallel and non-serial at the same time.  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

Cross‐spectral synergy and consonant identification

Thomas Ulrich Christiansen, Steven Greenberg
2008 Journal of the Acoustical Society of America  
Examples are presented for a room with a diffuse sound field, and for elongated rooms where the sound field is strongly non-diffuse, in the case of both diffuse and specular reflections. 3760 Enclosures  ...  The main drawback of FDTD numerical schemes is their computational cost in large scale simulations.  ...  To reduce spurious effects, such as numerical diffraction, to a negligible level, a high-order numerical scheme and an immersed interface method are used together.  ... 
doi:10.1121/1.2935680 fatcat:znwocm35unasharfwbcap5omim

Intrusion Detection System for Energy Efficient Cluster based Vehicular Adhoc Networks

M V B Murali Krishna M, C. Anbu Ananth, N. Krishna Raj
2021 International Journal of Advanced Computer Science and Applications  
A vehicular Adhoc Network, a subfield of Mobile Adhoc Network is defined by its high mobility and by demonstrating dissimilar mobility patterns.  ...  The proposed FLC-OFSVM model involves two stages of operations namely clustering and intrusion detection.  ...  Standard safety data provides high priority in VANET related to non-safety data, then safety data inform driver of predictable danger to permit earlier response.  ... 
doi:10.14569/ijacsa.2021.0121025 fatcat:q3h5fjiorjhjblirvoqu6r327e

A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)

Sheikh, Liang, Wang
2019 Sensors  
potential to provide road safety and precautionary measures for the drivers and passengers.  ...  All the security attacks in VANETs and their related countermeasures are discussed with respect to ensuring secure communication.  ...  Acknowledgments: We would like to thank Amelia Regan from the University of California, Irvine. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19163589 fatcat:gh4aysf2l5ecjbq7xh5nr3wpx4

Machine type communications: key drivers and enablers towards the 6G era

Nurul Huda Mahmood, Stefan Böcker, Ingrid Moerman, Onel A. López, Andrea Munari, Konstantin Mikhaylov, Federico Clazzer, Hannes Bartz, Ok-Sun Park, Eric Mercier, Selma Saidi, Diana Moya Osorio (+22 others)
2021 EURASIP Journal on Wireless Communications and Networking  
This paper explores the main drivers and requirements of MTC towards 6G, and discusses a wide variety of enabling technologies.  ...  Finally, key enablers towards (1) ultra-low power MTC, (2) massively scalable global connectivity, (3) critical and dependable MTC, and (4) security and privacy preserving schemes for MTC are detailed.  ...  Point-to-multipoint capabilities in 6G RAN and core networks Sometimes a common message needs to be delivered to multiple receivers within a given area with a defined and stable QoS, e.g., in the case  ... 
doi:10.1186/s13638-021-02010-5 fatcat:2vv47yjuffaefd2rhg3o4rlxjm

Intrusion Detection System for Energy Efficient Cluster Based Vehicular Adhoc Networks

R. Lavanya, S. Kannan
2022 Intelligent Automation and Soft Computing  
The proposed FLC-OFSVM model involves two stages of operations namely clustering and intrusion detections.  ...  At the same time, security is also a major design issue in VANET, this can be resolved by the intrusion detection systems (IDS).  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/iasc.2022.021467 fatcat:3fve2sxrcrfxfeu6h67kykeg6e

D3.2 – Use Cases Manual & Requirements and Business Analysis – Initial

ASSIST-IoT Consortium
2021 Zenodo  
Initial version of business scenarios, use cases and requirements. Defines dependencies, inter-relations and mapping of requirements onto business needs and technical solutions  ...  driver. • In some cases (e.g., for truck drivers) the identification will be impossible to perform.  ...  Remote operation of the RTG over a stable wired and/or wireless network connection. Initial status There is a stable connection between the RTG and RTG remote operator terminal.  ... 
doi:10.5281/zenodo.6705178 fatcat:oh7er2limred5e6m25euz32shu

D3.3 – Use Cases Manual & Requirements and Business Analysis – Final

ASSIST-IoT Consortium
2022 Zenodo  
Final version of business scenarios, use cases and requirements. Defines dependencies, inter-relations and mapping of requirements onto business needs and technical solutions.  ...  learning scheme requires a stable, reliable connection between ASSIST-IoT and OEM.  ...  In order to ensure the proper functioning of this tag for the purpose of falls identification, its stable position on a human body should be provided Acceptance criteria Identification of fall or immobility  ... 
doi:10.5281/zenodo.6759023 fatcat:pvamcjk65nexzknatlem6lhxce

2021 Index IEEE Transactions on Intelligent Transportation Systems Vol. 22

2021 IEEE transactions on intelligent transportation systems (Print)  
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  and Intrusion Detection mous Vehicles.  ... 
doi:10.1109/tits.2021.3139738 fatcat:p2mkawtrsbaepj4zk24xhyl2oa

A Survey on Autonomous Vehicle Control in the Era of Mixed-Autonomy: From Physics-Based to AI-Guided Driving Policy Learning [article]

Xuan Di, Rongye Shi
2020 arXiv   pre-print
While reviewing the methodologies, we primarily focus on the following research questions: (1) What scalable driving policies are to control a large number of AVs in mixed traffic comprised of human drivers  ...  robotics and machine learning, to join forces towards creating a safe and efficient mixed traffic ecosystem.  ...  Acknowledgments The authors would like to thank Data Science Institute from Columbia University for providing a seed grant for this research.  ... 
arXiv:2007.05156v1 fatcat:6pr3en5opfguje77wpa4dwr6pi

NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints [article]

Chuadhry Mujeeb Ahmed, Aditya Mathur, Martin Ochoa
2017 arXiv   pre-print
in a CPS with up to 97% accuracy.  ...  Also, it can be leveraged to construct a novel challenge-response protocol that exposes cyber-attacks.  ...  It is also shown that the proposed scheme is scalable for tens of sensors and that the sensor fingerprint is stable over time.  ... 
arXiv:1712.01598v1 fatcat:crhahdqh4rcmfk4cdijcbiun2y

Attacks and defences on intelligent connected vehicles: A survey

Mahdi Dibaei, Xi Zheng, Kun Jiang, Robert Abbas, Shigang Liu, Yuexin Zhang, Yang Xiang, Shui Yu
2020 Digital Communications and Networks  
A B S T R A C T Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle  ...  attacks (e.g., hijacking attacks) and vehicle-to-everything communicationattacks (e.g., data theft).  ...  This form of attack is often combated by using reputation-based schemes that reward drivers that send out legitimate information and punish drivers that send out falsified information.  ... 
doi:10.1016/j.dcan.2020.04.007 fatcat:bdfjxoyibfez5ebob352xlurmu

Situation Awareness for Autonomous Vehicles Using Blockchain-based Service Cooperation [article]

Huong Nguyen, Tri Nguyen, Teemu Leppänen, Juha Partala, Susanna Pirttikangas
2022 arXiv   pre-print
As a part of such Intelligent Traffic Systems, cooperation between different stakeholders needs to be facilitated rapidly, reliably, and securely.  ...  To solve the issues of trust and latency in data sharing between these stakeholders, we propose a decentralized framework that enables smart contracts between traffic data producers and consumers based  ...  Acknowledgment This research is done in a strategic research project TrustedMaaS under focus institute Infotech Oulu, University of Oulu, and ECSEL JU FRACTAL (grant 877056).  ... 
arXiv:2204.03313v1 fatcat:i5vhnefysbheravvs3r7kbny5i

Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-based Vehicular Ad Hoc Networks

Mohammad Asif Hossain, Rafidah Md Noor, Kok-Lim Alvin Yau, Saaidal Razalli Azzuhri, Muhammad Reza Zraba, Ismail Ahmedy
2020 IEEE Access  
Vehicular ad hoc network (VANET) is expected to be the key role player in reducing road casualties and traffic congestion. To ensure this role, a gigantic amount of data should be exchanged.  ...  Cognitive radio (CR) is a promising solution to overcome such an issue.  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their comments and constructive suggestions which helped them to improve this manuscript.  ... 
doi:10.1109/access.2020.2989870 fatcat:fpp3m3rts5gghcnlkyelzt3ykq
« Previous Showing results 1 — 15 out of 991 results