[go: up one dir, main page]

El-Shafai et al., 2025 - Google Patents

AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities

El-Shafai et al., 2025

View PDF
Document ID
1381162317278403471
Author
El-Shafai W
Azar A
Ahmed S
Publication year
Publication venue
IEEE Access

External Links

Snippet

Vehicular Ad-hoc Networks (VANETs) are integral to the fabric of Intelligent Transportation Systems (ITSs), facilitating essential vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. However, the rising prevalence of jamming attacks, characterized by …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models

Similar Documents

Publication Publication Date Title
Bangui et al. A hybrid machine learning model for intrusion detection in VANET
Alalwany et al. Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions
Khan et al. An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Anyanwu et al. Novel hyper-tuned ensemble random forest algorithm for the detection of false basic safety messages in internet of vehicles
Nandanwar et al. TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
El-Shafai et al. AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities
Zhang et al. Many-objective optimization based intrusion detection for in-vehicle network security
Tiwari et al. A secure and robust machine learning model for intrusion detection in internet of vehicles
Hakeem et al. Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security
Alzahrani Novel approach for intrusion detection attacks on small drones using ConvLSTM model
Li et al. Blockchain‐based federated learning approaches in internet of things applications
Yanmin et al. Leveraging LSTM and GRU-based deep neural coordination in intelligent transportation to strengthen security in the Internet of Vehicles
Sultana et al. Detecting Sybil attacks in VANET: exploring feature diversity and deep learning algorithms with insights into sybil node associations
Meganathan et al. Security establishment using deep convolutional network model in cyber-physical systems
Yang et al. A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm
Al‐Quayed et al. Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities
Pramila et al. Defense Mechanisms for Vehicular Networks: Deep Learning Approaches for Detecting DDoS Attacks.
Hamadi Artificial intelligence applications in intrusion detection systems for unmanned aerial vehicles
Ogab et al. Machine Learning-Based Intrusion Detection Systems for the Internet of Drones: A Systematic Literature Review
Abdullahi et al. A Robust Misbehavior Detection System for Cooperative Driving Network
Behera et al. Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach.
Khanduja Traffic Congestion Sybil Attack Detection in VANETs Using Machine Learning Techniques
Kishore et al. Malware attack detection in vehicle cyber physical system for planning and control using deep learning
Khan et al. Enhancing Autonomous Vehicle Security: Federated Learning for Detecting GPS Spoofing Attack
Jin et al. Blockchain-based UAV continuous authentication