Skip to main content

Showing 1–4 of 4 results for author: Ali, M H

Searching in archive eess. Search in all archives.
.
  1. arXiv:2207.10807  [pdf

    cs.LG eess.SP

    A Machine Learning Approach for Driver Identification Based on CAN-BUS Sensor Data

    Authors: Md. Abbas Ali Khan, Mphammad Hanif Ali, AKM Fazlul Haque, Md. Tarek Habib

    Abstract: Driver identification is a momentous field of modern decorated vehicles in the controller area network (CAN-BUS) perspective. Many conventional systems are used to identify the driver. One step ahead, most of the researchers use sensor data of CAN-BUS but there are some difficulties because of the variation of the protocol of different models of vehicle. Our aim is to identify the driver through s… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  2. arXiv:2109.10763  [pdf

    cs.CR eess.SY

    A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence

    Authors: Manoj Basnet, Mohd. Hasan Ali

    Abstract: The automation and connectivity of CAV inherit most of the cyber-physical vulnerabilities of incumbent technologies such as evolving network architectures, wireless communications, and AI-based automation. This book chapter entails the cyber-physical vulnerabilities and risks that originated in IT, OT, and the physical domains of the CAV ecosystem, eclectic threat landscapes, and threat intelligen… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: Book chapter

  3. Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning

    Authors: Manoj Basnet, M. Hasan Ali

    Abstract: The surging usage of electric vehicles (EVs) demand the robust deployment of trustworthy electric vehicle charging station (EVCS) with millisecond range latency and massive machine to machine communications where 5G could act. However, 5G suffers from inherent protocols, hardware, and software vulnerabilities that seriously threaten the communicating entities' cyber-physical security. To overcome… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

    Comments: journal preprint

  4. arXiv:2104.07409  [pdf

    eess.SY cs.LG

    Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station

    Authors: Manoj Basnet, Subash Poudyal, Mohd. Hasan Ali, Dipankar Dasgupta

    Abstract: The Supervisory control and data acquisition (SCADA) systems have been continuously leveraging the evolution of network architecture, communication protocols, next-generation communication techniques (5G, 6G, Wi-Fi 6), and the internet of things (IoT). However, SCADA system has become the most profitable and alluring target for ransomware attackers. This paper proposes the deep learning-based nove… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: conference