Cybersecurity in Robotic Autonomous Vehicles - Alruwaili, Ahmed; Islam, Sardar M. N.; Gondal, Iqbal; - Prospero Internet Bookshop

Cybersecurity in Robotic Autonomous Vehicles

Machine Learning Applications to Detect Cyber Attacks
 
Edition number: 1
Publisher: CRC Press
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 49.99
Estimated price in HUF:
26 244 HUF (24 995 HUF + 5% VAT)
Why estimated?
 
Your price:

23 620 (22 496 HUF + 5% VAT )
discount is: 10% (approx 2 624 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Short description:

Cybersecurity in Robotic Autonomous Vehicles introduces a novel Intrusion Detection System (IDS) specifically designed for AVs, which leverages data prioritization in CAN IDs to enhance threat detection and mitigation. It offers a pioneering intrusion detection model for AVs that uses machine and deep learning algorithms.

Long description:

Cybersecurity in Robotic Autonomous Vehicles introduces a novel Intrusion Detection System (IDS) specifically designed for AVs, which leverages data prioritization in CAN IDs to enhance threat detection and mitigation. It offers a pioneering intrusion detection model for AVs that uses machine and deep learning algorithms.


Presenting a new method for improving vehicle security, the book demonstrates how the IDS have incorporated machine learning and deep learning frameworks to analyze CAN Bus traffic and identify the presence of any malicious activities in real time with high level of accuracy. It provides a comprehensive examination of the cybersecurity risks faced by AVs with a particular emphasis on CAN vulnerabilities and the innovative use of data prioritization within CAN IDs.


The book will interest researchers and advanced undergraduate students taking courses in cybersecurity, automotive engineering, and data science. Automotive industry and robotics professionals focusing on internet-of-vehicles and cybersecurity will also benefit from the contents.

Table of Contents:

1. Introduction.  2. Theoretical Lens.  3. Exploring CAN Bus Security: Insights and Analysis.  4. Research Design.  5. Results and Discussion.  6. Conclusions and Future Research.