The integration of IoT systems into automotive vehicles has raised concerns associated with intrusion detection within these systems. Vehicles equipped with a controller area network (CAN) control several systems within a vehicle where disruptions in function can lead to significant malfunctions, injuries, and even loss of life. Detecting disruption is a primary concern as vehicles move to higher degrees of autonomy and the possibility of self-driving is explored. Tackling cyber-security challenges within CAN is essential to improve vehicle and road safety. Standard differences between different manufacturers make the implementation of a discreet system difficult; therefore, data-driven techniques are needed to tackle the ever-evolving landscape of cyber security within the automotive field. This paper examines the possibility of using machine learning classifiers to identify cyber assaults in CAN systems. To achieve applicability, we cover two classifiers: extreme gradient boost and K-nearest neighbor algorithms. However, as their performance hinges on proper parameter selection, a modified metaheuristic optimizer is introduced as well to tackle parameter optimization. The proposed approach is tested on a publicly available dataset with the best-performing models exceeding 89% accuracy. Optimizer outcomes have undergone rigorous statistical analysis, and the best-performing models were subjected to analysis using explainable artificial intelligence techniques to determine feature impacts on the best-performing model.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11447263 | PMC |
http://dx.doi.org/10.1038/s41598-024-73932-5 | DOI Listing |
Theranostics
January 2025
State Key Laboratory of Medicinal Chemical Biology, Tianjin Key Laboratory of Molecular Recognition and Biosensing, Frontiers Science Center for New Organic Matter, College of Chemistry, Nankai University, Tianjin 300071, China.
Bladder cancer (BC) ranks as one of the most prevalent cancers. Its early diagnosis is clinically essential but remains challenging due to the lack of reliable biomarkers. Extracellular vesicles (EVs) carry abundant biological cargoes from parental cells, rendering them as promising cancer biomarkers.
View Article and Find Full Text PDFSci Rep
January 2025
School of Mathematics and Computer Science, Tongling University, Tongling, 244061, China.
The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, and autonomous vehicles. As well, intrusion detection, the subject of this paper, relies heavily on it. Different intrusion detection models have been constructed using ANNs.
View Article and Find Full Text PDFSci Rep
January 2025
College of Computing and Information Technology, University of Bisha, Bisha, Bisha, 61922, Saudi Arabia.
Smart devices are enabled via the Internet of Things (IoT) and are connected in an uninterrupted world. These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users.
View Article and Find Full Text PDFMol Neurobiol
January 2025
Translational Oncology Laboratory, Department of Zoology, Hansraj College, Delhi University, New Delhi, 110007, India.
This review explores the current understanding and recent advancements in neuroblastoma, one of the most common extracranial solid pediatric cancers, accounting for ~ 15% of childhood cancer-related mortality. The hallmarks of NBL, including angiogenesis, metastasis, apoptosis resistance, cell cycle dysregulation, drug resistance, and responses to hypoxia and ROS, underscore its complex biology. The tumor microenvironment's significance in disease progression is acknowledged in this study, along with the pivotal role of cancer stem cells in sustaining tumor growth and heterogeneity.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Software, Faculty of Artificial Intelligence and Software, Gachon University, Seongnam-si, 13120, Republic of Korea.
Network security is crucial in today's digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!