Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adop...

Full description

Saved in:
Bibliographic Details
Superior document:NowOpen
:
TeilnehmendeR:
Place / Publishing House:Norwell, MA : : Now Publishers,, 2022.
©2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Series:NowOpen Series
Physical Description:1 electronic resource (158 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993577371004498
ctrlnum (CKB)5860000000282519
(oapen)https://directory.doabooks.org/handle/20.500.12854/95759
(MiAaPQ)EBC30325737
(Au-PeEL)EBL30325737
(EXLCZ)995860000000282519
collection bib_alma
record_format marc
spelling Guijarro, Jordi.
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
1st ed.
Norwell, MA : Now Publishers, 2022.
©2022.
1 electronic resource (158 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
NowOpen
Open access Unrestricted online access star
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.
English
Description based on publisher supplied metadata and other sources.
Computer security bicssc
Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence
1-63828-060-6
Mhiri, Saber.
Choi, You-Jun.
NowOpen Series
language English
format eBook
author Guijarro, Jordi.
spellingShingle Guijarro, Jordi.
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
NowOpen
author_facet Guijarro, Jordi.
Mhiri, Saber.
Choi, You-Jun.
author_variant j g jg
author2 Mhiri, Saber.
Choi, You-Jun.
author2_variant s m sm
y j c yjc
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Guijarro, Jordi.
title Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_full Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_fullStr Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_full_unstemmed Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_auth Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_new Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
title_sort artificial intelligence-based cybersecurity for connected and automated vehicles.
series NowOpen
series2 NowOpen
publisher Now Publishers,
publishDate 2022
physical 1 electronic resource (158 p.)
edition 1st ed.
isbn 1-63828-061-4
1-63828-060-6
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 620 - Engineering
dewey-ones 629 - Other branches of engineering
dewey-full 629.2
dewey-sort 3629.2
dewey-raw 629.2
dewey-search 629.2
work_keys_str_mv AT guijarrojordi artificialintelligencebasedcybersecurityforconnectedandautomatedvehicles
AT mhirisaber artificialintelligencebasedcybersecurityforconnectedandautomatedvehicles
AT choiyoujun artificialintelligencebasedcybersecurityforconnectedandautomatedvehicles
status_str n
ids_txt_mv (CKB)5860000000282519
(oapen)https://directory.doabooks.org/handle/20.500.12854/95759
(MiAaPQ)EBC30325737
(Au-PeEL)EBL30325737
(EXLCZ)995860000000282519
carrierType_str_mv cr
hierarchy_parent_title NowOpen
is_hierarchy_title Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
container_title NowOpen
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796652733154983936
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01890nam a22004093i 4500</leader><controlfield tag="001">993577371004498</controlfield><controlfield tag="005">20240415084506.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">240415s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-63828-061-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5860000000282519</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/95759</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30325737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30325737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995860000000282519</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.2</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Guijarro, Jordi.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, MA :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (158 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NowOpen</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-63828-060-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mhiri, Saber.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choi, You-Jun.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NowOpen Series</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-16 06:10:15 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-01-09 04:44:33 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5342570390004498&amp;Force_direct=true</subfield><subfield code="Z">5342570390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5342570390004498</subfield></datafield></record></collection>