910 research outputs found

    Survey of Bayesian Networks Applications to Intelligent Autonomous Vehicles

    Full text link
    This article reviews the applications of Bayesian Networks to Intelligent Autonomous Vehicles (IAV) from the decision making point of view, which represents the final step for fully Autonomous Vehicles (currently under discussion). Until now, when it comes making high level decisions for Autonomous Vehicles (AVs), humans have the last word. Based on the works cited in this article and analysis done here, the modules of a general decision making framework and its variables are inferred. Many efforts have been made in the labs showing Bayesian Networks as a promising computer model for decision making. Further research should go into the direction of testing Bayesian Network models in real situations. In addition to the applications, Bayesian Network fundamentals are introduced as elements to consider when developing IAVs with the potential of making high level judgement calls.Comment: 34 pages, 2 figures, 3 table

    A Survey on Trust Metrics for Autonomous Robotic Systems

    Full text link
    This paper surveys the area of Trust Metrics related to security for autonomous robotic systems. As the robotics industry undergoes a transformation from programmed, task oriented, systems to Artificial Intelligence-enabled learning, these autonomous systems become vulnerable to several security risks, making a security assessment of these systems of critical importance. Therefore, our focus is on a holistic approach for assessing system trust which requires incorporating system, hardware, software, cognitive robustness, and supplier level trust metrics into a unified model of trust. We set out to determine if there were already trust metrics that defined such a holistic system approach. While there are extensive writings related to various aspects of robotic systems such as, risk management, safety, security assurance and so on, each source only covered subsets of an overall system and did not consistently incorporate the relevant costs in their metrics. This paper attempts to put this prior work into perspective, and to show how it might be extended to develop useful system-level trust metrics for evaluating complex robotic (and other) systems

    BIBLIOMETRIC STUDY ON THE DEVELOPMENT AND IMPLEMENTATION OF CYBERSECURITY IN AUTONOMOUS VEHICLES

    Get PDF
    The main objective was to examine the trajectory of scientific research in this domain, identify the most influential publications related to cybersecurity in autonomous vehicles and pinpoint research opportunities, supported by the PRISMA method. Additionally, the study explores cybersecurity themes in autonomous vehicles, emphasizing the significance of concepts like blockchain, machine learning, and deep learning essential in formulating business strategies. Furthermore, the research identifies influential scientific publications, predominant journals, the most productive countries, and authors with the most publications on cybersecurity in autonomous vehicles. It identifies research opportunities organized into two distinct clusters to provide a comprehensive understanding of the current state of research in this field and offer insights for companies and academics interested in contributing to future advancements in the cybersecurity of autonomous vehicles. The article demonstrates that cybersecurity is a fundamental area for the development and implementation of secure and reliable autonomous vehicles.info:eu-repo/semantics/publishedVersio

    BIBLIOMETRIC STUDY ON THE DEVELOPMENT AND IMPLEMENTATION OF CYBERSECURITY IN AUTONOMOUS VEHICLES

    Get PDF
    The main objective was to examine the trajectory of scientific research in this domain, identify the most influential publications related to cybersecurity in autonomous vehicles and pinpoint research opportunities, supported by the PRISMA method. Additionally, the study explores cybersecurity themes in autonomous vehicles, emphasizing the significance of concepts like blockchain, machine learning, and deep learning essential in formulating business strategies. Furthermore, the research identifies influential scientific publications, predominant journals, the most productive countries, and authors with the most publications on cybersecurity in autonomous vehicles. It identifies research opportunities organized into two distinct clusters to provide a comprehensive understanding of the current state of research in this field and offer insights for companies and academics interested in contributing to future advancements in the cybersecurity of autonomous vehicles. The article demonstrates that cybersecurity is a fundamental area for the development and implementation of secure and reliable autonomous vehicles.info:eu-repo/semantics/publishedVersio

    Autonomous Vehicles an overview on system, cyber security, risks, issues, and a way forward

    Full text link
    This chapter explores the complex realm of autonomous cars, analyzing their fundamental components and operational characteristics. The initial phase of the discussion is elucidating the internal mechanics of these automobiles, encompassing the crucial involvement of sensors, artificial intelligence (AI) identification systems, control mechanisms, and their integration with cloud-based servers within the framework of the Internet of Things (IoT). It delves into practical implementations of autonomous cars, emphasizing their utilization in forecasting traffic patterns and transforming the dynamics of transportation. The text also explores the topic of Robotic Process Automation (RPA), illustrating the impact of autonomous cars on different businesses through the automation of tasks. The primary focus of this investigation lies in the realm of cybersecurity, specifically in the context of autonomous vehicles. A comprehensive analysis will be conducted to explore various risk management solutions aimed at protecting these vehicles from potential threats including ethical, environmental, legal, professional, and social dimensions, offering a comprehensive perspective on their societal implications. A strategic plan for addressing the challenges and proposing strategies for effectively traversing the complex terrain of autonomous car systems, cybersecurity, hazards, and other concerns are some resources for acquiring an understanding of the intricate realm of autonomous cars and their ramifications in contemporary society, supported by a comprehensive compilation of resources for additional investigation. Keywords: RPA, Cyber Security, AV, Risk, Smart Car

    Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms

    Get PDF
    The purpose of the research is to evaluate Machine Learning and Big Data Analytics paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, processes and operations that are framed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data analysis of large data sets and production of models for the general relationships found among data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, unsupervised, semi-supervised, and reinforcement learning algorithms
    • …
    corecore