Technical Paper
Cyber Threats and its Mitigation to Intelligent Transportation System
2024-01-16
2024-26-0184
The conventional methods mostly practised includes network segmentation and cryptography that are followed for ITS cybersecurity. The article also focus on innovative approaches that have recently adopted my many cybersecurity professionals for secured operation of ITS involves block-chain, artificial intelligence, bloom filter, fog computing, game theory and ontologies. ...The article also focus on innovative approaches that have recently adopted my many cybersecurity professionals for secured operation of ITS involves block-chain, artificial intelligence, bloom filter, fog computing, game theory and ontologies.