Fig. 6From: Security strategy for autonomous vehicle cyber-physical systems using transfer learningConversion into image stepsBack to article page