Secure and Digitalized Future Mobility: Shaping the Ground and Air Vehicles Cooperation
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2023
|
Schlagwörter: | |
Links: | https://doi.org/10.1201/b22998 https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7131163 https://doi.org/10.1201/b22998 |
Abstract: | This book discusses the recent advanced technologies in Intelligent Transportation Systems (ITS), with a view on how Unmanned Aerial Vehicles (UAVs) cooperate with future vehicles |
Umfang: | 1 Online-Ressource (xi, 258 Seiten) |
ISBN: | 9781000655964 9781003306504 |
DOI: | 10.1201/b22998 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048632528 | ||
003 | DE-604 | ||
005 | 20230606 | ||
007 | cr|uuu---uuuuu | ||
008 | 230105s2023 xx o|||| 00||| eng d | ||
020 | |a 9781000655964 |q electronic bk. |9 978-1-00-065596-4 | ||
020 | |a 9781003306504 |9 978-1-003-30650-4 | ||
024 | 7 | |a 10.1201/b22998 |2 doi | |
035 | |a (ZDB-30-PQE)EBC7131163 | ||
035 | |a (ZDB-30-PAD)EBC7131163 | ||
035 | |a (ZDB-89-EBL)EBL7131163 | ||
035 | |a (OCoLC)1350687264 | ||
035 | |a (DE-599)BVBBV048632528 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-573 | ||
100 | 1 | |a Cao, Yue |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure and Digitalized Future Mobility |b Shaping the Ground and Air Vehicles Cooperation |c Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li |
264 | 1 | |a Boca Raton |b CRC Press |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource (xi, 258 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- Contributors -- Chapter 1 ▪ The Overview of Air-Ground Cooperation -- List of abbreviations -- 1.1 Introduction -- 1.2 UAV-UGV Cooperation System -- 1.3 Cooperation System Application -- 1.4 Conclusion -- References -- Chapter 2 ▪ Autonomous and Connected UAVs/Drones -- List of Abbreviations -- 2.1 Introduction -- 2.2 Significance of UAV Usages in IoT Use Cases -- 2.3 Literature Survey -- 2.4 Issues-Based Techniques in UAV System -- 2.5 Open Research Challenges in Connected UAV System -- 2.6 Conclusions -- References -- Chapter 3 ▪ Multisensor Random Finite Set Information Fusion: Advances, Challenges, and Opportunities -- 3.1 Introduction -- 3.2 RFS Estimation -- 3.3 Multisensor Measurement Fusion -- 3.4 Multisensor Suboptimal MPD Fusion -- 3.5 Remaining Challenges and Beyond -- Acknowledgment -- References -- Chapter 4 ▪ Next-Generation Connected Traffic Using UAVs/Drones -- List of Abbreviation -- 4.1 Unmanned Ariel Vehicles -- 4.2 Routing Protocols for UAVs -- 4.3 UAVs Based Other Solutions -- References -- Chapter 5 ▪ Machine Learning for UAV Communication-Assisted Computing Networks -- List of Abbreviations -- 5.1 Introduction -- 5.2 Projects for Aerial Computing in 6G -- 5.3 ML for Aerial Computing Networks -- 5.4 Challenges and Future Directions -- 5.5 Conclusions -- References -- Chapter 6 ▪ A Review of Intrusion Detection in FANETs -- List of Abbreviations -- 6.1 Introduction -- 6.2 Taxonomy of Cyber Attacks -- 6.3 Intrusion Detection System -- 6.4 Comparison and Evaluation of IDSs -- 6.5 Conclusion and Future -- References -- Chapter 7 ▪ Critical Analysis of Security and Privacy Challenges for UAV Networks -- List of Abbreviations -- 7.1 Introduction -- 7.2 Security and Privacy in UAVs -- 7.3 Challenges and Future Directions for Research | |
505 | 8 | |a 7.4 Conclusion -- References -- Chapter 8 ▪ Security in Connected Drones Environment -- List of Abbreviations -- 8.1 Introduction -- 8.2 Background Studies on Drone Security -- 8.3 Prototype Design -- 8.4 Evaluation of Drone Security -- 8.5 Software-Based Testing -- 8.6 Result Analysis -- 8.7 Conclusion and Future Works -- References -- Chapter 9 ▪ Routing Protocols in Vehicular and Aerial Delay Tolerant Networks -- List of Abbreviations -- 9.1 Introduction -- 9.2 Basic Routing Protocols in Delay Tolerant Networks -- 9.3 Improvements in Vehicular DTNs -- 9.4 Improvements in Aerial DTNs -- 9.5 Applications -- 9.6 Further Discussions -- 9.7 Conclusion -- References -- Chapter 10 ▪ Fog Bank of Vehicles for Next-Generation Connected Traffic -- List of Abbreviations -- 10.1 Introduction -- 10.2 Significance of Fog Computing for Next-Generation Connected Traffic -- 10.3 Literature Survey -- 10.4 Performance Metrics-Based Fog Computing Techniques for Next-Generation Connected Traffic -- 10.5 Open Research Challenges -- 10.6 Conclusions -- References -- Chapter 11 ▪ Edge Intelligence Empowered Resource Optimization in IoV -- List of Abbreviations -- 11.1 Introduction -- 11.2 Background -- 11.3 Key Enablers and Optimization Themes -- 11.4 EI Empowered Resource Optimization in IoV -- 11.5 Open Challenges and Future Directions -- 11.6 Conclusion -- References -- Chapter 12 ▪ A Trend in Smart Charging, Vehicle-to-Grid and Route Mapping -- List of Abbreviations -- 12.1 Introduction -- 12.2 Smart Charging -- 12.3 V2G Centralized Control Architectures -- 12.4 V2G Decentralized Architecture -- 12.5 Route Mapping -- 12.6 Open Research Issues in E-Mobility -- 12.7 Conclusion -- References -- Chapter 13 ▪ Vehicle-to-Vehicle-Enabled EV Charging Scenario Iteration -- List of Abbreviations -- 13.1 Introduction -- 13.2 Scalability of V2V Charging System | |
505 | 8 | |a 13.3 Charging Service Modes -- 13.4 V2V Charging for On-the-Move EVs -- 13.5 V2V Charging for Parked EVs -- 13.6 V2V Charging Price Model -- 13.7 V2V Charging Energy Model -- 13.8 Further Discussion -- 13.9 Conclusion -- References -- Chapter 14 ▪ Introduction and Overview of V2G Security -- List of Abbreviations -- 14.1 Introduction -- 14.2 Background and Related Work about EV Charging -- 14.3 Attack Classification -- 14.4 Mitigation and Protection -- 14.5 Further Discussion -- 14.6 Conclusion -- References | |
520 | 3 | |a This book discusses the recent advanced technologies in Intelligent Transportation Systems (ITS), with a view on how Unmanned Aerial Vehicles (UAVs) cooperate with future vehicles | |
653 | 6 | |a Electronic books | |
700 | 1 | |a Kaiwartya, Omprakash |e Sonstige |4 oth | |
700 | 1 | |a Li, Tiancheng |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Cao, Yue |t Secure and Digitalized Future Mobility |d Milton : Taylor & Francis Group,c2022 |z 9781032307534 |
856 | 4 | 0 | |u https://doi.org/10.1201/b22998 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-7-TFC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034007547 | |
966 | e | |u https://doi.org/10.1201/b22998 |l DE-573 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7131163 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818990210232352768 |
---|---|
any_adam_object | |
author | Cao, Yue |
author_facet | Cao, Yue |
author_role | aut |
author_sort | Cao, Yue |
author_variant | y c yc |
building | Verbundindex |
bvnumber | BV048632528 |
collection | ZDB-30-PQE ZDB-7-TFC |
contents | Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- Contributors -- Chapter 1 ▪ The Overview of Air-Ground Cooperation -- List of abbreviations -- 1.1 Introduction -- 1.2 UAV-UGV Cooperation System -- 1.3 Cooperation System Application -- 1.4 Conclusion -- References -- Chapter 2 ▪ Autonomous and Connected UAVs/Drones -- List of Abbreviations -- 2.1 Introduction -- 2.2 Significance of UAV Usages in IoT Use Cases -- 2.3 Literature Survey -- 2.4 Issues-Based Techniques in UAV System -- 2.5 Open Research Challenges in Connected UAV System -- 2.6 Conclusions -- References -- Chapter 3 ▪ Multisensor Random Finite Set Information Fusion: Advances, Challenges, and Opportunities -- 3.1 Introduction -- 3.2 RFS Estimation -- 3.3 Multisensor Measurement Fusion -- 3.4 Multisensor Suboptimal MPD Fusion -- 3.5 Remaining Challenges and Beyond -- Acknowledgment -- References -- Chapter 4 ▪ Next-Generation Connected Traffic Using UAVs/Drones -- List of Abbreviation -- 4.1 Unmanned Ariel Vehicles -- 4.2 Routing Protocols for UAVs -- 4.3 UAVs Based Other Solutions -- References -- Chapter 5 ▪ Machine Learning for UAV Communication-Assisted Computing Networks -- List of Abbreviations -- 5.1 Introduction -- 5.2 Projects for Aerial Computing in 6G -- 5.3 ML for Aerial Computing Networks -- 5.4 Challenges and Future Directions -- 5.5 Conclusions -- References -- Chapter 6 ▪ A Review of Intrusion Detection in FANETs -- List of Abbreviations -- 6.1 Introduction -- 6.2 Taxonomy of Cyber Attacks -- 6.3 Intrusion Detection System -- 6.4 Comparison and Evaluation of IDSs -- 6.5 Conclusion and Future -- References -- Chapter 7 ▪ Critical Analysis of Security and Privacy Challenges for UAV Networks -- List of Abbreviations -- 7.1 Introduction -- 7.2 Security and Privacy in UAVs -- 7.3 Challenges and Future Directions for Research 7.4 Conclusion -- References -- Chapter 8 ▪ Security in Connected Drones Environment -- List of Abbreviations -- 8.1 Introduction -- 8.2 Background Studies on Drone Security -- 8.3 Prototype Design -- 8.4 Evaluation of Drone Security -- 8.5 Software-Based Testing -- 8.6 Result Analysis -- 8.7 Conclusion and Future Works -- References -- Chapter 9 ▪ Routing Protocols in Vehicular and Aerial Delay Tolerant Networks -- List of Abbreviations -- 9.1 Introduction -- 9.2 Basic Routing Protocols in Delay Tolerant Networks -- 9.3 Improvements in Vehicular DTNs -- 9.4 Improvements in Aerial DTNs -- 9.5 Applications -- 9.6 Further Discussions -- 9.7 Conclusion -- References -- Chapter 10 ▪ Fog Bank of Vehicles for Next-Generation Connected Traffic -- List of Abbreviations -- 10.1 Introduction -- 10.2 Significance of Fog Computing for Next-Generation Connected Traffic -- 10.3 Literature Survey -- 10.4 Performance Metrics-Based Fog Computing Techniques for Next-Generation Connected Traffic -- 10.5 Open Research Challenges -- 10.6 Conclusions -- References -- Chapter 11 ▪ Edge Intelligence Empowered Resource Optimization in IoV -- List of Abbreviations -- 11.1 Introduction -- 11.2 Background -- 11.3 Key Enablers and Optimization Themes -- 11.4 EI Empowered Resource Optimization in IoV -- 11.5 Open Challenges and Future Directions -- 11.6 Conclusion -- References -- Chapter 12 ▪ A Trend in Smart Charging, Vehicle-to-Grid and Route Mapping -- List of Abbreviations -- 12.1 Introduction -- 12.2 Smart Charging -- 12.3 V2G Centralized Control Architectures -- 12.4 V2G Decentralized Architecture -- 12.5 Route Mapping -- 12.6 Open Research Issues in E-Mobility -- 12.7 Conclusion -- References -- Chapter 13 ▪ Vehicle-to-Vehicle-Enabled EV Charging Scenario Iteration -- List of Abbreviations -- 13.1 Introduction -- 13.2 Scalability of V2V Charging System 13.3 Charging Service Modes -- 13.4 V2V Charging for On-the-Move EVs -- 13.5 V2V Charging for Parked EVs -- 13.6 V2V Charging Price Model -- 13.7 V2V Charging Energy Model -- 13.8 Further Discussion -- 13.9 Conclusion -- References -- Chapter 14 ▪ Introduction and Overview of V2G Security -- List of Abbreviations -- 14.1 Introduction -- 14.2 Background and Related Work about EV Charging -- 14.3 Attack Classification -- 14.4 Mitigation and Protection -- 14.5 Further Discussion -- 14.6 Conclusion -- References |
ctrlnum | (ZDB-30-PQE)EBC7131163 (ZDB-30-PAD)EBC7131163 (ZDB-89-EBL)EBL7131163 (OCoLC)1350687264 (DE-599)BVBBV048632528 |
doi_str_mv | 10.1201/b22998 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06253nam a2200481 c 4500</leader><controlfield tag="001">BV048632528</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230606 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230105s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000655964</subfield><subfield code="q">electronic bk.</subfield><subfield code="9">978-1-00-065596-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003306504</subfield><subfield code="9">978-1-003-30650-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b22998</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7131163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7131163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7131163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1350687264</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048632528</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cao, Yue</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure and Digitalized Future Mobility</subfield><subfield code="b">Shaping the Ground and Air Vehicles Cooperation</subfield><subfield code="c">Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 258 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- Contributors -- Chapter 1 ▪ The Overview of Air-Ground Cooperation -- List of abbreviations -- 1.1 Introduction -- 1.2 UAV-UGV Cooperation System -- 1.3 Cooperation System Application -- 1.4 Conclusion -- References -- Chapter 2 ▪ Autonomous and Connected UAVs/Drones -- List of Abbreviations -- 2.1 Introduction -- 2.2 Significance of UAV Usages in IoT Use Cases -- 2.3 Literature Survey -- 2.4 Issues-Based Techniques in UAV System -- 2.5 Open Research Challenges in Connected UAV System -- 2.6 Conclusions -- References -- Chapter 3 ▪ Multisensor Random Finite Set Information Fusion: Advances, Challenges, and Opportunities -- 3.1 Introduction -- 3.2 RFS Estimation -- 3.3 Multisensor Measurement Fusion -- 3.4 Multisensor Suboptimal MPD Fusion -- 3.5 Remaining Challenges and Beyond -- Acknowledgment -- References -- Chapter 4 ▪ Next-Generation Connected Traffic Using UAVs/Drones -- List of Abbreviation -- 4.1 Unmanned Ariel Vehicles -- 4.2 Routing Protocols for UAVs -- 4.3 UAVs Based Other Solutions -- References -- Chapter 5 ▪ Machine Learning for UAV Communication-Assisted Computing Networks -- List of Abbreviations -- 5.1 Introduction -- 5.2 Projects for Aerial Computing in 6G -- 5.3 ML for Aerial Computing Networks -- 5.4 Challenges and Future Directions -- 5.5 Conclusions -- References -- Chapter 6 ▪ A Review of Intrusion Detection in FANETs -- List of Abbreviations -- 6.1 Introduction -- 6.2 Taxonomy of Cyber Attacks -- 6.3 Intrusion Detection System -- 6.4 Comparison and Evaluation of IDSs -- 6.5 Conclusion and Future -- References -- Chapter 7 ▪ Critical Analysis of Security and Privacy Challenges for UAV Networks -- List of Abbreviations -- 7.1 Introduction -- 7.2 Security and Privacy in UAVs -- 7.3 Challenges and Future Directions for Research</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.4 Conclusion -- References -- Chapter 8 ▪ Security in Connected Drones Environment -- List of Abbreviations -- 8.1 Introduction -- 8.2 Background Studies on Drone Security -- 8.3 Prototype Design -- 8.4 Evaluation of Drone Security -- 8.5 Software-Based Testing -- 8.6 Result Analysis -- 8.7 Conclusion and Future Works -- References -- Chapter 9 ▪ Routing Protocols in Vehicular and Aerial Delay Tolerant Networks -- List of Abbreviations -- 9.1 Introduction -- 9.2 Basic Routing Protocols in Delay Tolerant Networks -- 9.3 Improvements in Vehicular DTNs -- 9.4 Improvements in Aerial DTNs -- 9.5 Applications -- 9.6 Further Discussions -- 9.7 Conclusion -- References -- Chapter 10 ▪ Fog Bank of Vehicles for Next-Generation Connected Traffic -- List of Abbreviations -- 10.1 Introduction -- 10.2 Significance of Fog Computing for Next-Generation Connected Traffic -- 10.3 Literature Survey -- 10.4 Performance Metrics-Based Fog Computing Techniques for Next-Generation Connected Traffic -- 10.5 Open Research Challenges -- 10.6 Conclusions -- References -- Chapter 11 ▪ Edge Intelligence Empowered Resource Optimization in IoV -- List of Abbreviations -- 11.1 Introduction -- 11.2 Background -- 11.3 Key Enablers and Optimization Themes -- 11.4 EI Empowered Resource Optimization in IoV -- 11.5 Open Challenges and Future Directions -- 11.6 Conclusion -- References -- Chapter 12 ▪ A Trend in Smart Charging, Vehicle-to-Grid and Route Mapping -- List of Abbreviations -- 12.1 Introduction -- 12.2 Smart Charging -- 12.3 V2G Centralized Control Architectures -- 12.4 V2G Decentralized Architecture -- 12.5 Route Mapping -- 12.6 Open Research Issues in E-Mobility -- 12.7 Conclusion -- References -- Chapter 13 ▪ Vehicle-to-Vehicle-Enabled EV Charging Scenario Iteration -- List of Abbreviations -- 13.1 Introduction -- 13.2 Scalability of V2V Charging System</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13.3 Charging Service Modes -- 13.4 V2V Charging for On-the-Move EVs -- 13.5 V2V Charging for Parked EVs -- 13.6 V2V Charging Price Model -- 13.7 V2V Charging Energy Model -- 13.8 Further Discussion -- 13.9 Conclusion -- References -- Chapter 14 ▪ Introduction and Overview of V2G Security -- List of Abbreviations -- 14.1 Introduction -- 14.2 Background and Related Work about EV Charging -- 14.3 Attack Classification -- 14.4 Mitigation and Protection -- 14.5 Further Discussion -- 14.6 Conclusion -- References</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book discusses the recent advanced technologies in Intelligent Transportation Systems (ITS), with a view on how Unmanned Aerial Vehicles (UAVs) cooperate with future vehicles</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaiwartya, Omprakash</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Tiancheng</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Cao, Yue</subfield><subfield code="t">Secure and Digitalized Future Mobility</subfield><subfield code="d">Milton : Taylor & Francis Group,c2022</subfield><subfield code="z">9781032307534</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/b22998</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034007547</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/b22998</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7131163</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048632528 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:50:45Z |
institution | BVB |
isbn | 9781000655964 9781003306504 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034007547 |
oclc_num | 1350687264 |
open_access_boolean | |
owner | DE-2070s DE-573 |
owner_facet | DE-2070s DE-573 |
physical | 1 Online-Ressource (xi, 258 Seiten) |
psigel | ZDB-30-PQE ZDB-7-TFC ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
spelling | Cao, Yue Verfasser aut Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li Boca Raton CRC Press 2023 ©2023 1 Online-Ressource (xi, 258 Seiten) txt rdacontent c rdamedia cr rdacarrier Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- Contributors -- Chapter 1 ▪ The Overview of Air-Ground Cooperation -- List of abbreviations -- 1.1 Introduction -- 1.2 UAV-UGV Cooperation System -- 1.3 Cooperation System Application -- 1.4 Conclusion -- References -- Chapter 2 ▪ Autonomous and Connected UAVs/Drones -- List of Abbreviations -- 2.1 Introduction -- 2.2 Significance of UAV Usages in IoT Use Cases -- 2.3 Literature Survey -- 2.4 Issues-Based Techniques in UAV System -- 2.5 Open Research Challenges in Connected UAV System -- 2.6 Conclusions -- References -- Chapter 3 ▪ Multisensor Random Finite Set Information Fusion: Advances, Challenges, and Opportunities -- 3.1 Introduction -- 3.2 RFS Estimation -- 3.3 Multisensor Measurement Fusion -- 3.4 Multisensor Suboptimal MPD Fusion -- 3.5 Remaining Challenges and Beyond -- Acknowledgment -- References -- Chapter 4 ▪ Next-Generation Connected Traffic Using UAVs/Drones -- List of Abbreviation -- 4.1 Unmanned Ariel Vehicles -- 4.2 Routing Protocols for UAVs -- 4.3 UAVs Based Other Solutions -- References -- Chapter 5 ▪ Machine Learning for UAV Communication-Assisted Computing Networks -- List of Abbreviations -- 5.1 Introduction -- 5.2 Projects for Aerial Computing in 6G -- 5.3 ML for Aerial Computing Networks -- 5.4 Challenges and Future Directions -- 5.5 Conclusions -- References -- Chapter 6 ▪ A Review of Intrusion Detection in FANETs -- List of Abbreviations -- 6.1 Introduction -- 6.2 Taxonomy of Cyber Attacks -- 6.3 Intrusion Detection System -- 6.4 Comparison and Evaluation of IDSs -- 6.5 Conclusion and Future -- References -- Chapter 7 ▪ Critical Analysis of Security and Privacy Challenges for UAV Networks -- List of Abbreviations -- 7.1 Introduction -- 7.2 Security and Privacy in UAVs -- 7.3 Challenges and Future Directions for Research 7.4 Conclusion -- References -- Chapter 8 ▪ Security in Connected Drones Environment -- List of Abbreviations -- 8.1 Introduction -- 8.2 Background Studies on Drone Security -- 8.3 Prototype Design -- 8.4 Evaluation of Drone Security -- 8.5 Software-Based Testing -- 8.6 Result Analysis -- 8.7 Conclusion and Future Works -- References -- Chapter 9 ▪ Routing Protocols in Vehicular and Aerial Delay Tolerant Networks -- List of Abbreviations -- 9.1 Introduction -- 9.2 Basic Routing Protocols in Delay Tolerant Networks -- 9.3 Improvements in Vehicular DTNs -- 9.4 Improvements in Aerial DTNs -- 9.5 Applications -- 9.6 Further Discussions -- 9.7 Conclusion -- References -- Chapter 10 ▪ Fog Bank of Vehicles for Next-Generation Connected Traffic -- List of Abbreviations -- 10.1 Introduction -- 10.2 Significance of Fog Computing for Next-Generation Connected Traffic -- 10.3 Literature Survey -- 10.4 Performance Metrics-Based Fog Computing Techniques for Next-Generation Connected Traffic -- 10.5 Open Research Challenges -- 10.6 Conclusions -- References -- Chapter 11 ▪ Edge Intelligence Empowered Resource Optimization in IoV -- List of Abbreviations -- 11.1 Introduction -- 11.2 Background -- 11.3 Key Enablers and Optimization Themes -- 11.4 EI Empowered Resource Optimization in IoV -- 11.5 Open Challenges and Future Directions -- 11.6 Conclusion -- References -- Chapter 12 ▪ A Trend in Smart Charging, Vehicle-to-Grid and Route Mapping -- List of Abbreviations -- 12.1 Introduction -- 12.2 Smart Charging -- 12.3 V2G Centralized Control Architectures -- 12.4 V2G Decentralized Architecture -- 12.5 Route Mapping -- 12.6 Open Research Issues in E-Mobility -- 12.7 Conclusion -- References -- Chapter 13 ▪ Vehicle-to-Vehicle-Enabled EV Charging Scenario Iteration -- List of Abbreviations -- 13.1 Introduction -- 13.2 Scalability of V2V Charging System 13.3 Charging Service Modes -- 13.4 V2V Charging for On-the-Move EVs -- 13.5 V2V Charging for Parked EVs -- 13.6 V2V Charging Price Model -- 13.7 V2V Charging Energy Model -- 13.8 Further Discussion -- 13.9 Conclusion -- References -- Chapter 14 ▪ Introduction and Overview of V2G Security -- List of Abbreviations -- 14.1 Introduction -- 14.2 Background and Related Work about EV Charging -- 14.3 Attack Classification -- 14.4 Mitigation and Protection -- 14.5 Further Discussion -- 14.6 Conclusion -- References This book discusses the recent advanced technologies in Intelligent Transportation Systems (ITS), with a view on how Unmanned Aerial Vehicles (UAVs) cooperate with future vehicles Electronic books Kaiwartya, Omprakash Sonstige oth Li, Tiancheng Sonstige oth Erscheint auch als Druck-Ausgabe Cao, Yue Secure and Digitalized Future Mobility Milton : Taylor & Francis Group,c2022 9781032307534 https://doi.org/10.1201/b22998 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cao, Yue Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- Contributors -- Chapter 1 ▪ The Overview of Air-Ground Cooperation -- List of abbreviations -- 1.1 Introduction -- 1.2 UAV-UGV Cooperation System -- 1.3 Cooperation System Application -- 1.4 Conclusion -- References -- Chapter 2 ▪ Autonomous and Connected UAVs/Drones -- List of Abbreviations -- 2.1 Introduction -- 2.2 Significance of UAV Usages in IoT Use Cases -- 2.3 Literature Survey -- 2.4 Issues-Based Techniques in UAV System -- 2.5 Open Research Challenges in Connected UAV System -- 2.6 Conclusions -- References -- Chapter 3 ▪ Multisensor Random Finite Set Information Fusion: Advances, Challenges, and Opportunities -- 3.1 Introduction -- 3.2 RFS Estimation -- 3.3 Multisensor Measurement Fusion -- 3.4 Multisensor Suboptimal MPD Fusion -- 3.5 Remaining Challenges and Beyond -- Acknowledgment -- References -- Chapter 4 ▪ Next-Generation Connected Traffic Using UAVs/Drones -- List of Abbreviation -- 4.1 Unmanned Ariel Vehicles -- 4.2 Routing Protocols for UAVs -- 4.3 UAVs Based Other Solutions -- References -- Chapter 5 ▪ Machine Learning for UAV Communication-Assisted Computing Networks -- List of Abbreviations -- 5.1 Introduction -- 5.2 Projects for Aerial Computing in 6G -- 5.3 ML for Aerial Computing Networks -- 5.4 Challenges and Future Directions -- 5.5 Conclusions -- References -- Chapter 6 ▪ A Review of Intrusion Detection in FANETs -- List of Abbreviations -- 6.1 Introduction -- 6.2 Taxonomy of Cyber Attacks -- 6.3 Intrusion Detection System -- 6.4 Comparison and Evaluation of IDSs -- 6.5 Conclusion and Future -- References -- Chapter 7 ▪ Critical Analysis of Security and Privacy Challenges for UAV Networks -- List of Abbreviations -- 7.1 Introduction -- 7.2 Security and Privacy in UAVs -- 7.3 Challenges and Future Directions for Research 7.4 Conclusion -- References -- Chapter 8 ▪ Security in Connected Drones Environment -- List of Abbreviations -- 8.1 Introduction -- 8.2 Background Studies on Drone Security -- 8.3 Prototype Design -- 8.4 Evaluation of Drone Security -- 8.5 Software-Based Testing -- 8.6 Result Analysis -- 8.7 Conclusion and Future Works -- References -- Chapter 9 ▪ Routing Protocols in Vehicular and Aerial Delay Tolerant Networks -- List of Abbreviations -- 9.1 Introduction -- 9.2 Basic Routing Protocols in Delay Tolerant Networks -- 9.3 Improvements in Vehicular DTNs -- 9.4 Improvements in Aerial DTNs -- 9.5 Applications -- 9.6 Further Discussions -- 9.7 Conclusion -- References -- Chapter 10 ▪ Fog Bank of Vehicles for Next-Generation Connected Traffic -- List of Abbreviations -- 10.1 Introduction -- 10.2 Significance of Fog Computing for Next-Generation Connected Traffic -- 10.3 Literature Survey -- 10.4 Performance Metrics-Based Fog Computing Techniques for Next-Generation Connected Traffic -- 10.5 Open Research Challenges -- 10.6 Conclusions -- References -- Chapter 11 ▪ Edge Intelligence Empowered Resource Optimization in IoV -- List of Abbreviations -- 11.1 Introduction -- 11.2 Background -- 11.3 Key Enablers and Optimization Themes -- 11.4 EI Empowered Resource Optimization in IoV -- 11.5 Open Challenges and Future Directions -- 11.6 Conclusion -- References -- Chapter 12 ▪ A Trend in Smart Charging, Vehicle-to-Grid and Route Mapping -- List of Abbreviations -- 12.1 Introduction -- 12.2 Smart Charging -- 12.3 V2G Centralized Control Architectures -- 12.4 V2G Decentralized Architecture -- 12.5 Route Mapping -- 12.6 Open Research Issues in E-Mobility -- 12.7 Conclusion -- References -- Chapter 13 ▪ Vehicle-to-Vehicle-Enabled EV Charging Scenario Iteration -- List of Abbreviations -- 13.1 Introduction -- 13.2 Scalability of V2V Charging System 13.3 Charging Service Modes -- 13.4 V2V Charging for On-the-Move EVs -- 13.5 V2V Charging for Parked EVs -- 13.6 V2V Charging Price Model -- 13.7 V2V Charging Energy Model -- 13.8 Further Discussion -- 13.9 Conclusion -- References -- Chapter 14 ▪ Introduction and Overview of V2G Security -- List of Abbreviations -- 14.1 Introduction -- 14.2 Background and Related Work about EV Charging -- 14.3 Attack Classification -- 14.4 Mitigation and Protection -- 14.5 Further Discussion -- 14.6 Conclusion -- References |
title | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation |
title_auth | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation |
title_exact_search | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation |
title_full | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li |
title_fullStr | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li |
title_full_unstemmed | Secure and Digitalized Future Mobility Shaping the Ground and Air Vehicles Cooperation Edited by Yue Cao, Omprakash Kaiwartya, and Tiancheng Li |
title_short | Secure and Digitalized Future Mobility |
title_sort | secure and digitalized future mobility shaping the ground and air vehicles cooperation |
title_sub | Shaping the Ground and Air Vehicles Cooperation |
url | https://doi.org/10.1201/b22998 |
work_keys_str_mv | AT caoyue secureanddigitalizedfuturemobilityshapingthegroundandairvehiclescooperation AT kaiwartyaomprakash secureanddigitalizedfuturemobilityshapingthegroundandairvehiclescooperation AT litiancheng secureanddigitalizedfuturemobilityshapingthegroundandairvehiclescooperation |