Vol. 2 No. 2 (2022): African Journal of Artificial Intelligence and Sustainable Development
Articles

Adaptive Learning Systems for Cyber Threat Detection in Autonomous Vehicles - A Computational Intelligence Approach: Explores adaptive learning systems for cyber threat detection in AVs, employing a computational intelligence approach

Dr. Aisha Hassan
Professor of Computer Science, University of Khartoum, Sudan
Cover

Published 20-09-2022

Keywords

  • Autonomous Vehicles,
  • Cybersecurity,
  • Adaptive Learning Systems

How to Cite

[1]
Dr. Aisha Hassan, “Adaptive Learning Systems for Cyber Threat Detection in Autonomous Vehicles - A Computational Intelligence Approach: Explores adaptive learning systems for cyber threat detection in AVs, employing a computational intelligence approach”, African J. of Artificial Int. and Sust. Dev., vol. 2, no. 2, pp. 55–64, Sep. 2022, Accessed: Nov. 22, 2024. [Online]. Available: https://africansciencegroup.com/index.php/AJAISD/article/view/57

Abstract

In the era of autonomous vehicles (AVs), ensuring their cybersecurity is paramount. This paper investigates adaptive learning systems for cyber threat detection in AVs, employing a computational intelligence approach. The research explores the integration of adaptive algorithms with AVs' cybersecurity frameworks to enhance threat detection and response capabilities. The study highlights the significance of adaptive learning in addressing evolving cyber threats, offering insights into the implementation challenges and future directions for research in this area.

Downloads

Download data is not yet available.

References

  1. Tatineni, Sumanth. "Recommendation Systems for Personalized Learning: A Data-Driven Approach in Education." Journal of Computer Engineering and Technology (JCET) 4.2 (2020).
  2. Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
  3. Venkataramanan, Srinivasan, Ashok Kumar Reddy Sadhu, and Mahammad Shaik. "Fortifying The Edge: A Multi-Pronged Strategy To Thwart Privacy And Security Threats In Network Access Management For Resource-Constrained And Disparate Internet Of Things (IOT) Devices." Asian Journal of Multidisciplinary Research & Review 1.1 (2020): 97-125.
  4. Tatineni, Sumanth. "An Integrated Approach to Predictive Maintenance Using IoT and Machine Learning in Manufacturing." International Journal of Electrical Engineering and Technology (IJEET) 11.8 (2020).
  5. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.