Emerging Trends in Cybersecurity Applications 2022
DOI: 10.1007/978-3-031-09640-2_10
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Framework for Intrusion Detection in VANET Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In these cases, malicious edges are found utilizing density of sub-graphs, structural, temporal, and content information extraction, and a greedy search strategy, respectively. A probabilistic method of detection was utilized to propose an anomaly node detection method in [22].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In these cases, malicious edges are found utilizing density of sub-graphs, structural, temporal, and content information extraction, and a greedy search strategy, respectively. A probabilistic method of detection was utilized to propose an anomaly node detection method in [22].…”
Section: Literature Reviewmentioning
confidence: 99%
“…As a result, the following are the visible and concealed unit state marginal probability distributions by eq. (21,22):…”
Section: Breach Detection Using Ensemble Adversarial Boltzmann Convol...mentioning
confidence: 99%
“…The GBO method uses a key component to achieve a balanced exploration of important search space regions while getting close to global and near-optimal spots. The use of ρ is described in terms of Equations ( 7)- (9).…”
Section: Gradient Search Rule (Gsr)mentioning
confidence: 99%
“…The IDS sounds an alarm when these patterns are present in network traffic. Misuse-based IDS are effective at spotting well-known attacks, but they may struggle to deal with brand-new or unidentified attack patterns [9]. Furthermore, it can be resource-intensive to maintain and update the signature database.…”
Section: Introductionmentioning
confidence: 99%