Deception in Autonomous Transport Systems (Record no. 88009)

000 -LEADER
fixed length control field 05769nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-031-55044-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172108.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240515s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031550447
-- 978-3-031-55044-7
082 04 - CLASSIFICATION NUMBER
Call Number 006.3
245 10 - TITLE STATEMENT
Title Deception in Autonomous Transport Systems
Sub Title Threats, Impacts and Mitigation Policies /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 196 p. 20 illus., 12 illus. in color.
490 1# - SERIES STATEMENT
Series statement Wireless Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Ethical dilemmas in autonomous driving: philosophical, social and public policy implications -- Smart Cities: Concept, Pillars, and Challenges -- The Connected and Autonomous Vehicle Trade-off: Functional Benefits versus Security Risks -- Connected and Autonomous Vehicles and Infrastructure Needs Exploring Road Network Changes and Policy Interventions -- Centralised Intelligent Traffic Routing in the Light of Disobedience of Drivers -- Detecting Abnormal Vehicle Behaviour: A Clustering-Based Approach -- AI Approaches on Urban Public Transport Routing -- Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systems -- Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour -- Securing Vehicle-to-Drone (V2D) Communications: Challenges and Solutions -- The Use of GPS Spoofing Attacks in Location Deception.
520 ## - SUMMARY, ETC.
Summary, etc This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating the threats facing autonomous transport systems and how they can contribute towards a deceptive attack, followed by their potential impact if successful, and finally, how they can be mitigated. The work in this book is grouped into three parts. This first part focuses on the area of smart cities, policies, and ethics. This includes critically appraising the trade-off between functionality and security with connected and autonomous vehicles. The second discusses a range of AI applications in the wider field of smart transport and mobility, such as detecting anomalies in vehicle behaviour to investigating detecting disobedient vehicles. Finally, the third part presents and discusses cybersecurity-related aspects to consider when dealing with Connected and Autonomous Vehicles (CAVs) and smart urban infrastructure. This includes analysing different attacks to investigating secure communication technologies. CAVs are a game-changing technology with the potential to transform the way transport is perceived, mobility is serviced, travel ecosystems 'behave', and cities and societies as a whole function. There are many foreseen safety, accessibility and sustainability benefits resulting from the adoption of CAVs because of their ability, in theory, to operate error-free and collaboratively, ranging from accident prevention, congestion reduction and decreased carbon emissions to time savings, increased social inclusion, optimised routing, and better traffic control. However, no matter what the expected benefits are, CAVs are at the same time susceptible to an unprecedented number of new digital and physical threats. The severity of these threats has resulted in an increased effort to deepen our understanding of CAVs when it comes to their safety and resilience. In this complex and multi-faceted scenario, this book aims to provide an extensive overview of the risks related to the malicious exploitation of CAVs and beyond, the potential ways in which vulnerabilities can be exploited, prevention and mitigation policies and techniques, and the impact that the non-acceptance of Connected and Autonomous Mobility can have on the Smart City agenda. This book targets researchers, practitioners, and advanced-level students in computer science and transport engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Parkinson, Simon.
700 1# - AUTHOR 2
Author 2 Nikitas, Alexandros.
700 1# - AUTHOR 2
Author 2 Vallati, Mauro.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-55044-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Transportation engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Traffic engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Wireless communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile communication systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Transportation Technology and Traffic Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Wireless and Mobile Communication.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2366-1445
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.