El-Shafai et al., 2025 - Google Patents
AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart CitiesEl-Shafai et al., 2025
View PDF- Document ID
- 1381162317278403471
- Author
- El-Shafai W
- Azar A
- Ahmed S
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Vehicular Ad-hoc Networks (VANETs) are integral to the fabric of Intelligent Transportation Systems (ITSs), facilitating essential vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. However, the rising prevalence of jamming attacks, characterized by …
- 238000001514 detection method 0 title abstract description 152
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bangui et al. | A hybrid machine learning model for intrusion detection in VANET | |
| Alalwany et al. | Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions | |
| Khan et al. | An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach | |
| Anyanwu et al. | Novel hyper-tuned ensemble random forest algorithm for the detection of false basic safety messages in internet of vehicles | |
| Nandanwar et al. | TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment | |
| El-Shafai et al. | AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities | |
| Zhang et al. | Many-objective optimization based intrusion detection for in-vehicle network security | |
| Tiwari et al. | A secure and robust machine learning model for intrusion detection in internet of vehicles | |
| Hakeem et al. | Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security | |
| Alzahrani | Novel approach for intrusion detection attacks on small drones using ConvLSTM model | |
| Li et al. | Blockchain‐based federated learning approaches in internet of things applications | |
| Yanmin et al. | Leveraging LSTM and GRU-based deep neural coordination in intelligent transportation to strengthen security in the Internet of Vehicles | |
| Sultana et al. | Detecting Sybil attacks in VANET: exploring feature diversity and deep learning algorithms with insights into sybil node associations | |
| Meganathan et al. | Security establishment using deep convolutional network model in cyber-physical systems | |
| Yang et al. | A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm | |
| Al‐Quayed et al. | Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities | |
| Pramila et al. | Defense Mechanisms for Vehicular Networks: Deep Learning Approaches for Detecting DDoS Attacks. | |
| Hamadi | Artificial intelligence applications in intrusion detection systems for unmanned aerial vehicles | |
| Ogab et al. | Machine Learning-Based Intrusion Detection Systems for the Internet of Drones: A Systematic Literature Review | |
| Abdullahi et al. | A Robust Misbehavior Detection System for Cooperative Driving Network | |
| Behera et al. | Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach. | |
| Khanduja | Traffic Congestion Sybil Attack Detection in VANETs Using Machine Learning Techniques | |
| Kishore et al. | Malware attack detection in vehicle cyber physical system for planning and control using deep learning | |
| Khan et al. | Enhancing Autonomous Vehicle Security: Federated Learning for Detecting GPS Spoofing Attack | |
| Jin et al. | Blockchain-based UAV continuous authentication |