Author
Contributions by role
Author 2
Mushtaq Ahmad
Department of Business informatics, Technical University of Vienna (TUWIEN), Austria
Summary
Edited Journals
ICCK Contributions

Open Access | Research Article | 21 September 2025
Mitigating Message Injection Attacks in Internet of Vehicles Using Deep Learning Based Intrusion Detection System
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 4: 208-221, 2025 | DOI: 10.62762/TACS.2025.560376
Abstract
Real-time communication between autonomous vehicles, infrastructure, and their environment has facilitated the Internet of Vehicles (IoVs). Although this connectivity provides vehicular networks with significant benefits, it also introduces severe security threats, such as message injection attacks, particularly due to the heavy reliance on the Controller Area Network (CAN) protocol, which is inherently vulnerable. Electronic Control Units (ECUs) become primary targets for these attacks, leading to unsafe vehicle behaviors. To address these challenges, an Intrusion Detection System (IDS) based on deep learning architectures, Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), and... More >

Graphical Abstract
Mitigating Message Injection Attacks in Internet of Vehicles Using Deep Learning Based Intrusion Detection System

Open Access | Research Article | 29 August 2025
Intelligent Cyber-Attack Detection for Autonomous Vehicles Using Advanced Deep Learning Models
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 3: 180-192, 2025 | DOI: 10.62762/TACS.2025.952297
Abstract
The Internet of Vehicles (IoV) has greatly influenced transportation by allowing autonomous vehicles to interact and communicate with other cars as well as with the surrounding traffic system. Even so, being interconnected comes with risks in terms of cyber attacks, for example, by injecting messages or fooling sensors through CAN systems. The study, consequently, suggests an Intrusion Detection System (IDS) that uses Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Bidirectional Encoder Representations from Transformers (BERT), and RoBERTa, to properly detect and handle these cyber threats. To solve the problem of unbalanced data, we use R... More >

Graphical Abstract
Intelligent Cyber-Attack Detection for Autonomous Vehicles Using Advanced Deep Learning Models