Huang et al., 2023 - Google Patents
Ill-ids: An incremental lifetime learning ids for vanetsHuang et al., 2023
- Document ID
- 13802920542758218187
- Author
- Huang Y
- Ma M
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
Abstract Vehicle Ad Hoc Network (VANET) is one of the most important approaches for intelligent vehicles to communicate under complex road conditions. However, as a VANET is working under wireless and complex conditions, it is under the threat of various malicious …
- 238000001514 detection method 0 abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Campos et al. | Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges | |
Liu et al. | Blockchain and machine learning for communications and networking systems | |
Qi et al. | Model aggregation techniques in federated learning: A comprehensive survey | |
US9661019B2 (en) | System and method for distributed denial of service identification and prevention | |
Zeng et al. | Senior2local: A machine learning based intrusion detection method for vanets | |
Elnakib et al. | EIDM: deep learning model for IoT intrusion detection systems | |
Rawat et al. | Ai based drones for security concerns in smart cities | |
Dalal et al. | Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment | |
Alhaidari et al. | A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems | |
Huang et al. | Ill-ids: An incremental lifetime learning ids for vanets | |
Alladi et al. | A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems | |
Banerjee et al. | Unsupervised learning for trustworthy IoT | |
Bohara et al. | Adversarial artificial intelligence assistance for secure 5G-enabled IoT | |
Kumar et al. | Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning | |
Zhen et al. | Intelligent-based ensemble deep learning model for security improvement in real-time wireless communication | |
Kołodziej et al. | Intelligent Transportation Systems–Models, Challenges, Security Aspects | |
Ruiz-Villafranca et al. | MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats | |
Hasan et al. | Advanced persistent threat identification with boosting and explainable AI | |
Bhavsar et al. | FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT | |
Panda et al. | Blackhole attack prediction in wireless sensor networks using support vector machine | |
Karthikeyan et al. | A secured IoT-based intelligent transport system (IoT-ITS) framework based on cognitive science | |
Campos et al. | Misbehavior detection in intelligent transportation systems based on federated learning | |
Chen et al. | Fast and practical intrusion detection system based on federated learning for VANET | |
Mirlashari et al. | Enhancing IoT intrusion detection system with modified E-GraphSAGE: a graph neural network approach | |
Sontakke et al. | Hybrid DNN-BiLSTM-aided intrusion detection and trust-clustering and routing-based intrusion prevention system in VANET |