2022
DOI: 10.1016/j.compeleceng.2022.108088
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-based attacks prevention algorithm for autonomous vehicles using machine learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…Likewise, a native VMM [23,24] can be considered as a unique OS [9] since it enables multi-programming across varying sorts of hybrid cloud VMs. The system calls, made by the VMM, are considered as hardware instructions from the VMM.…”
Section: Service Instance In Amazon's Ec2 Vmmentioning
confidence: 99%
“…Likewise, a native VMM [23,24] can be considered as a unique OS [9] since it enables multi-programming across varying sorts of hybrid cloud VMs. The system calls, made by the VMM, are considered as hardware instructions from the VMM.…”
Section: Service Instance In Amazon's Ec2 Vmmentioning
confidence: 99%
“…He is known for his completion analyses and theorems of consistency continuum hypothesis, as documented in [40]. This study employed an alternative methodology as opposed to the research conducted by [41], who posited that mathematical logic may show mathematical completeness. In the subsequent decades, [42] offered unequivocal verification of Godel's discoveries.…”
Section: Artificial Intelligence-brain Heuristic Comparisonmentioning
confidence: 99%
“…The primary aim of this data processing task is to identify and choose the most effective characteristics that result in the highest level of differentiation among the various flights within the dataset. Various approaches, including Branch and Bound, Floating Sequential search, and Backward & Forward selection, are used to exhaustively explore all possible combinations of characteristics [31]. An exhaustive examination of these methodologies beyond the boundaries of this research article [32].…”
Section: Feature Selectionmentioning
confidence: 99%