A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective
Recent advances in attack/anomaly detection and resilience strategies for connected and
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
Attacks on self-driving cars and their countermeasures: A survey
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …
[HTML][HTML] The deceitful connected and autonomous vehicle: defining the concept, contextualising its dimensions and proposing mitigation policies
Abstract The Connected and Autonomous Vehicle (CAV) is an emerging mobility technology
that may hold a paradigm-changing potential for the future of transport policy and planning …
that may hold a paradigm-changing potential for the future of transport policy and planning …
Systematic Review on the Recent Trends of Cybersecurity in Automobile Industry
CP Eze, J Emmanuel, CIO Onietan… - … and Business for …, 2023 - ieeexplore.ieee.org
The increasing integration of technology in automobiles has raised industry concerns about
cyber-security. This paper provides an overview of the most recent developments in …
cyber-security. This paper provides an overview of the most recent developments in …
Gaussian process based message filtering for robust multi-agent cooperation in the presence of adversarial communication
R Mitchell, J Blumenkamp, A Prorok - arXiv preprint arXiv:2012.00508, 2020 - arxiv.org
In this paper, we consider the problem of providing robustness to adversarial communication
in multi-agent systems. Specifically, we propose a solution towards robust cooperation …
in multi-agent systems. Specifically, we propose a solution towards robust cooperation …
Covariance-robust dynamic watermarking
Attack detection and mitigation strategies for cyberphysical systems (CPS) are an active
area of research, and researchers have developed a variety of attack-detection tools such as …
area of research, and researchers have developed a variety of attack-detection tools such as …
Resilient Event Triggered Interval Type‐2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
A Mohammed, C Ramlal, L Marine… - Journal of Advanced …, 2024 - Wiley Online Library
Connected and autonomous vehicles (CAVs) are considered a hot area of research in the
field of intelligent transportation systems. However, over the past few years, cybersecurity …
field of intelligent transportation systems. However, over the past few years, cybersecurity …
Adaptive secure lateral control of autonomous electric vehicles under denial-of-service attacks
H Liu, Y Wang, K Wang - … of the Institute of Measurement and …, 2024 - journals.sagepub.com
In this paper, the adaptive lateral control problem is considered for autonomous electric
vehicles under denial-of-service (DoS) attacks. Autonomous electric vehicles require high …
vehicles under denial-of-service (DoS) attacks. Autonomous electric vehicles require high …
A dynamic watermarking algorithm for finite markov decision problems
J Tang, J Song, A Gupta - arXiv preprint arXiv:2111.04952, 2021 - arxiv.org
Dynamic watermarking, as an active intrusion detection technique, can potentially detect
replay attacks, spoofing attacks, and deception attacks in the feedback channel for control …
replay attacks, spoofing attacks, and deception attacks in the feedback channel for control …
[PDF][PDF] A Comprehensive Review of Fault Tolerant and Resilient Cyber-Secure strategies for Critical Infrastructure Protection
A Mohammed, F Muddeen, CJ Ramlal… - The Industrial …, 2022 - researchgate.net
This paper reviews current methods being used to maintain resilient cyber-secure and fault
tolerant critical infrastructure (CI). Two main categories have been presented from a control …
tolerant critical infrastructure (CI). Two main categories have been presented from a control …