Fig. 8From: Security strategy for autonomous vehicle cyber-physical systems using transfer learningIIDS procedureBack to article page