Detecting cyber attacks in vehicle networks using improved LSTM based optimization methodology
Crossref DOI link: https://doi.org/10.1038/s41598-025-04643-8
Published Online: 2025-05-31
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Jayasri, C.
Balaji, V.
Nalayini, C. M.
Pradeep, S.
Text and Data Mining valid from 2025-05-31
Version of Record valid from 2025-05-31
Article History
Received: 7 February 2025
Accepted: 28 May 2025
First Online: 31 May 2025
Declarations
:
: The authors declare no competing interests.