<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> . <> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10205836> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/AcademicArticle> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/title> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/abstract> "This systematic literature review provides a structured and detailed overview of research on anomaly detection for connected and autonomous vehicles, focusing on the Artificial Intelligence methods employed, training approaches, and testing and evaluation techniques. The initial database search identified 2,160 articles, of which 203 were included in this review after rigorous screening and assessment. This study revealed that the most commonly used anomaly detection techniques employed are deep learning networks such as LSTM, CNN, and autoencoders, alongside one-class SVM. Most detection models were trained using real-world operational vehicle data, although anomalies, such as attacks and faults, were often injected artificially into the datasets. The models were evaluated primarily using five key evaluation metrics: recall, accuracy, precision, F1-score, and false positive rate. The most frequently used set of evaluation metrics for detection models were accuracy, precision, recall, and F1-score. The review makes several recommendations to improve future work related to anomaly detection models. It recommends providing comprehensive assessment of the anomaly detection models and emphasise the importance to share models publicly to facilitate collaboration within the research community and enable further validation. Recommendations also include the need for benchmarking datasets with predefined anomalies or cyberattacks (with comprehensive threat modelling) to test and improve the effectiveness of the proposed anomaly detection models. Future research should focus on the deployment of anomaly based detection in vehicles to evaluate their performance in real-world driving conditions, and explore systems using communication protocols beyond CAN, such as Ethernet and FlexRay."^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/date> "2025-01" . <https://discovery.ucl.ac.uk/id/document/1836423> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/volume> "26" . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/issue> "1" . <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> . <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> <http://xmlns.com/foaf/0.1/name> "Institute of Electrical and Electronics Engineers (IEEE)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> . <https://discovery.ucl.ac.uk/id/publication/ext-15249050> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> . <https://discovery.ucl.ac.uk/id/publication/ext-15249050> <http://xmlns.com/foaf/0.1/name> "IEEE Transactions on Intelligent Transportation Systems"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-15249050> . <https://discovery.ucl.ac.uk/id/publication/ext-15249050> <http://www.w3.org/2002/07/owl#sameAs> <urn:issn:15249050> . <https://discovery.ucl.ac.uk/id/publication/ext-15249050> <http://purl.org/ontology/bibo/issn> "15249050" . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> . <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> . <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> . <https://discovery.ucl.ac.uk/id/eprint/10205836#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> . <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> <http://xmlns.com/foaf/0.1/givenName> "Enrico"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> <http://xmlns.com/foaf/0.1/familyName> "Mariconti"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-277bf7bf5b8cd7a96b126960f97ab30a> <http://xmlns.com/foaf/0.1/name> "Enrico Mariconti"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> <http://xmlns.com/foaf/0.1/givenName> "Nilufer"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> <http://xmlns.com/foaf/0.1/familyName> "Tuptuk"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-837fd9c19141aba97fac84a3a56a2a77> <http://xmlns.com/foaf/0.1/name> "Nilufer Tuptuk"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> <http://xmlns.com/foaf/0.1/givenName> "John Roar Ventura"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> <http://xmlns.com/foaf/0.1/familyName> "Solaas"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-bf02a9091936c508dbf3743f73c5458a> <http://xmlns.com/foaf/0.1/name> "John Roar Ventura Solaas"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ArticleEPrint> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836423> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836423> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Text)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasAccepted> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836423> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/1/Systematic_Review__Anomaly_Detection_for_Connected_and_Autonomous_Vehicles.pdf> . <https://discovery.ucl.ac.uk/id/document/1836423> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/1/Systematic_Review__Anomaly_Detection_for_Connected_and_Autonomous_Vehicles.pdf> . <https://discovery.ucl.ac.uk/id/eprint/10205836/1/Systematic_Review__Anomaly_Detection_for_Connected_and_Autonomous_Vehicles.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic_Review__Anomaly_Detection_for_Connected_and_Autonomous_Vehicles.pdf"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836424> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/2/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/document/1836424> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/2/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/eprint/10205836/2/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836425> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/3/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/document/1836425> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/3/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10205836/3/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836426> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/4/preview.jpg> . <https://discovery.ucl.ac.uk/id/document/1836426> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/4/preview.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10205836/4/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836427> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/5/medium.jpg> . <https://discovery.ucl.ac.uk/id/document/1836427> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/5/medium.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10205836/5/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1836428> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://www.w3.org/2000/01/rdf-schema#label> "Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1836423> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10205836/6/small.jpg> . <https://discovery.ucl.ac.uk/id/document/1836428> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10205836/6/small.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10205836/6/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10205836> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10205836/> . <https://discovery.ucl.ac.uk/id/eprint/10205836/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10205836 \n\nSystematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles\n\n" . <https://discovery.ucl.ac.uk/id/eprint/10205836/> <http://purl.org/dc/elements/1.1/format> "text/html" . <https://discovery.ucl.ac.uk/id/eprint/10205836/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10205836> .