標(biāo)題: Titlebook: Deception in Autonomous Transport Systems; Threats, Impacts and Simon Parkinson,Alexandros Nikitas,Mauro Vallati Book 2024 The Editor(s) (i [打印本頁] 作者: FORGE 時(shí)間: 2025-3-21 18:08
書目名稱Deception in Autonomous Transport Systems影響因子(影響力)
書目名稱Deception in Autonomous Transport Systems影響因子(影響力)學(xué)科排名
書目名稱Deception in Autonomous Transport Systems網(wǎng)絡(luò)公開度
書目名稱Deception in Autonomous Transport Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Deception in Autonomous Transport Systems被引頻次
書目名稱Deception in Autonomous Transport Systems被引頻次學(xué)科排名
書目名稱Deception in Autonomous Transport Systems年度引用
書目名稱Deception in Autonomous Transport Systems年度引用學(xué)科排名
書目名稱Deception in Autonomous Transport Systems讀者反饋
書目名稱Deception in Autonomous Transport Systems讀者反饋學(xué)科排名
作者: 倒轉(zhuǎn) 時(shí)間: 2025-3-21 20:56 作者: Allergic 時(shí)間: 2025-3-22 01:39
https://doi.org/10.1007/3-540-31720-1zing the data securely. Although smart city projects vary in their scopes and scales across the globe, in general, the fundamental building blocks of a smart city are consistent. In this chapter we review the common blocks and discuss challenges to be addressed in the future.作者: 美學(xué) 時(shí)間: 2025-3-22 05:24 作者: CORD 時(shí)間: 2025-3-22 09:18
https://doi.org/10.1007/978-3-030-75190-6relationship between functional benefit and risk to determine the most appropriate mitigation technique. In this article, both functional benefits and security risks are discussed, laying the foundation for future research exploring this important intersection.作者: 矛盾 時(shí)間: 2025-3-22 13:14
https://doi.org/10.1007/978-3-030-75190-6obey their assigned routes if such routes are more expensive (e.g. take more time and/or more fuel). Disobedient drivers might then negatively affect costs of drivers who obeyed their routes. This chapter will elaborate on how disobedient drivers can affect the quality of the routes and what remedies might be taken to mitigate the problem.作者: 矛盾 時(shí)間: 2025-3-22 18:43 作者: sperse 時(shí)間: 2025-3-23 00:21 作者: thwart 時(shí)間: 2025-3-23 02:00
The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risksrelationship between functional benefit and risk to determine the most appropriate mitigation technique. In this article, both functional benefits and security risks are discussed, laying the foundation for future research exploring this important intersection.作者: 即席演說 時(shí)間: 2025-3-23 09:36 作者: Initiative 時(shí)間: 2025-3-23 11:30
Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systemsing in a concrete—albeit simple—case study. We finally discuss some implications involving cyber threat intelligence analysis techniques in autonomous transport systems and how proper uncertainty management is a powerful tool for preventing and mitigating many cyber threats affecting autonomous transport systems.作者: 不能逃避 時(shí)間: 2025-3-23 14:39 作者: Osmosis 時(shí)間: 2025-3-23 20:13
Praxis und Rhetorik deutscher Europapolitikhnology and reshaping the world, smart traffic investments and intelligent transport systems (ITS) can be critical for reducing road traffic congestion and all its adverse impacts (i.e. environmental degradation, noise pollution, traffic accidents, unhealthy lifestyles, productivity losses).作者: 戲法 時(shí)間: 2025-3-23 23:59
Data Analysis and ClassificationV-specific education to combating CAV deception are all points of reference for this chapter. Through a narrative literature review study, we offer suggestions for a new road classification framework that welcomes CAVs and then policy recommendations for improving CAV pro-people character.作者: 闖入 時(shí)間: 2025-3-24 03:36 作者: 啞劇 時(shí)間: 2025-3-24 09:11 作者: 瑣事 時(shí)間: 2025-3-24 14:23
Connected and Autonomous Vehicles and Infrastructure Needs: Exploring Road Network Changes and PolicV-specific education to combating CAV deception are all points of reference for this chapter. Through a narrative literature review study, we offer suggestions for a new road classification framework that welcomes CAVs and then policy recommendations for improving CAV pro-people character.作者: Antimicrobial 時(shí)間: 2025-3-24 16:15
Interaction Attacks as Deceitful Connected and Automated Vehicle Behavior case study aimed at further clarifying the phenomenon. Finally, we advance some remarks on interaction attacks as a form of deceitful CAV behavior according to the framework elaborated by (Nikitas et al., Transp Policy 122: 1–10, 2022) and call for further research on such a critical issue.作者: 恫嚇 時(shí)間: 2025-3-24 21:30 作者: Stagger 時(shí)間: 2025-3-25 00:03
MDL for Mixtures of Normal Distributionsenarios illustrating compromised security in V2D are discussed, emphasizing the need for robust security solutions. Finally, key security solutions for V2D communication are presented, offering insights into mitigating risks and ensuring the integrity and reliability of V2D interactions.作者: Infusion 時(shí)間: 2025-3-25 04:41
Praxis und Rhetorik deutscher Europapolitiknations, people and resources they need for enjoying an adequate standard of living and productivity. Efficient, safe, inclusive and sustainable mobility services and infrastructure have emerged therefore as a prerequisite (and possibly a benchmark) for city prosperity and societal well-being. Reach作者: Keratin 時(shí)間: 2025-3-25 09:15
Non-Hierarchical Classification Structuresions. In this paper, we explore the ethical dilemmas that arise when programming autonomous vehicles to make life-and-death decisions in situations where accidents are unavoidable. We begin by examining the trolley problem, a classic ethical thought experiment that has become a popular framework for作者: CIS 時(shí)間: 2025-3-25 13:27 作者: 安撫 時(shí)間: 2025-3-25 16:58 作者: 一個(gè)姐姐 時(shí)間: 2025-3-25 21:58 作者: Free-Radical 時(shí)間: 2025-3-26 01:51 作者: Enliven 時(shí)間: 2025-3-26 07:21 作者: Optic-Disk 時(shí)間: 2025-3-26 10:45 作者: Osteons 時(shí)間: 2025-3-26 13:49 作者: 鍵琴 時(shí)間: 2025-3-26 18:06
Validity Measures for Fuzzy Partitionsh on the technical and social levels. After some introductory remarks on cyberattacks, deception, and driving automation, we argue that interaction attacks and related risks still require to be adequately conceptualized. To this aim, we draw on Norbert Wiener’s notes on animals and cybernetic system作者: decode 時(shí)間: 2025-3-27 00:33
MDL for Mixtures of Normal Distributionses how V2D communication enhances perception capabilities and facilitates advanced functionalities. The chapter investigates into the critical security and privacy issues specific to V2D, including the threat landscape and challenges related to authentication and authorization. Several real-world sc作者: 胖人手藝好 時(shí)間: 2025-3-27 01:06
Data Analysis and Information Systemsnomous vehicles (CAVs), as being able to accurately determine location is essential to provide CAV functionality. This integral use of GPS has created the potential for CAV functionality dependent on knowing the location to be attacked, compromising the vehicle and instigating widespread impacts thr作者: 厭倦嗎你 時(shí)間: 2025-3-27 08:51
https://doi.org/10.1007/978-3-031-55044-7Connected and Autonomous Transport; Connected and Autonomous Vehicles; Future Mobility; Artificial Inte作者: Flat-Feet 時(shí)間: 2025-3-27 09:41 作者: 碌碌之人 時(shí)間: 2025-3-27 15:38 作者: Vertebra 時(shí)間: 2025-3-27 19:03
Wireless Networkshttp://image.papertrans.cn/d/image/264161.jpg作者: obnoxious 時(shí)間: 2025-3-28 00:29
Deception in Autonomous Transport Systems978-3-031-55044-7Series ISSN 2366-1186 Series E-ISSN 2366-1445 作者: 隨意 時(shí)間: 2025-3-28 02:10
Introduction,nations, people and resources they need for enjoying an adequate standard of living and productivity. Efficient, safe, inclusive and sustainable mobility services and infrastructure have emerged therefore as a prerequisite (and possibly a benchmark) for city prosperity and societal well-being. Reach作者: 清醒 時(shí)間: 2025-3-28 07:43 作者: 謙虛的人 時(shí)間: 2025-3-28 12:07 作者: 令人心醉 時(shí)間: 2025-3-28 18:11 作者: 怕失去錢 時(shí)間: 2025-3-28 20:36
Connected and Autonomous Vehicles and Infrastructure Needs: Exploring Road Network Changes and Policenvironments and cities as a whole, by reshaping their very form. This is a transformation with critical space and culture dimensions that may be complicated and could be responsible for a plethora of unprecedented opportunities and challenges. Physical and digital infrastructure enhancement package作者: corpuscle 時(shí)間: 2025-3-29 02:31
Centralized Intelligent Traffic Routing in the Light of Disobedience of Driversssigning routes to all vehicles not having their routes yet at once while considering some global objective function such as average travel time. Consequently, it might happen that different vehicles might get assigned different routes despite having the same origin and destination. Different routes作者: 保存 時(shí)間: 2025-3-29 05:49
Detecting Abnormal Vehicle Behavior: A Clustering-Based Approach and stored by the modern vehicle is increasing, and this is creating the potential to detect and prevent abnormal and potentially dangerous situations from occurring. The purpose of this paper is to investigate the area of intrusion detection using automotive data and to lay the foundations of rese作者: bronchiole 時(shí)間: 2025-3-29 10:11
AI Approaches on Urban Public Transport Routingtems. The AI applications in the PT operation offer the opportunities to alleviate traffic congestion and enhance the accessibility, mobility, and reliability of services with a more efficient and effective PT system. One of the key areas that AI is beneficial is in optimization of network route des作者: 保守 時(shí)間: 2025-3-29 14:58
Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systemsrs, benefits include accident prevention and decreased carbon emissions. Like any other computer system, they face a plethora of security threats, both traditional and novel. In this work, we show how cyber threat intelligence analysis techniques can help understand and investigate—and potentially m作者: Interdict 時(shí)間: 2025-3-29 17:41
Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviorh on the technical and social levels. After some introductory remarks on cyberattacks, deception, and driving automation, we argue that interaction attacks and related risks still require to be adequately conceptualized. To this aim, we draw on Norbert Wiener’s notes on animals and cybernetic system作者: 得體 時(shí)間: 2025-3-29 21:14 作者: Osmosis 時(shí)間: 2025-3-30 03:04
The Use of GPS Spoofing Attacks in Location Deceptionnomous vehicles (CAVs), as being able to accurately determine location is essential to provide CAV functionality. This integral use of GPS has created the potential for CAV functionality dependent on knowing the location to be attacked, compromising the vehicle and instigating widespread impacts thr