Fig. 11From: Security strategy for autonomous vehicle cyber-physical systems using transfer learningOverall steps of the experimentBack to article page