Artículos de conferencia
Permanent URI for this collection
Browse
Recent Submissions
- ItemThermal comfort and indoor air quality in new social housing in Chile: The case of Cordilleras de Doña Marta, Puente Alto, Santiago(2024) Flamant, Gilles; Bustamante Gómez, Waldo; CEDEUS (Chile)
- ItemDesign Recommendations for Office Building Facades Based on Visual Comfort and Minimum Energy Consumption Criteria: The case of Chile(2024) Bustamante Gómez, Waldo Enrique; Uribe, Daniel; Flamant, Gilles; Vera, Sergio; Molina, German; CEDEUS (Chile)
- ItemAvoiding algorithm aversion: Individuals embrace algorithms with a learning label(John Wiley & Sons Ltd., 2024) Chacon, Alvaro; Kausel Elicagaray, Edgar Ernesto; Reyes, Tomás H.; Trautmann, Stefan
- ItemWorst-Case-Optimal Joins on Graphs with Topological Relations(2025) Fuentes-Sepúlveda, José; Gómez-Brandón, Adrián; Hogan, Aidan; Irribarra-Cortés, Ayleen; Navarro, Gonzalo; Reutter De La Maza, Juan Lorenzo
- ItemAdaptive Intrusion Mitigation in Software-Defined Vehicles Using Deep Reinforcement Learning(2025) Kurunathan, Harrison; Ismail Ali, Hazem; Javanmardi, Gowhar; Eldefrawy, Mohamed; Gutiérrez Gaitán, Miguel José; Robles, Ramiro; Yomsi, Patrick; Tovar, EduardoSoftware-defined vehicles (SDVs) leverage vehicle-to-everything (V2X) communication to enable advanced connectivity and autonomous driving capabilities. However, this increased interconnectivity also exposes them to cyber threats such as spoofing, denial-of-service attacks, and data manipulation, making intrusion detection systems (IDS) essential for ensuring SDV security and reliability. In this work, we propose a novel intrusion mitigation approach that integrates Advantage Actor-Critic (A2C) reinforcement learning with a Long Short-Term Memory (LSTM) network to detect anomalies and intrusions in V2X communications. The LSTM component captures temporal dependencies in V2X data, enhancing the model's ability to identify emerging attack patterns, while the A2C framework dynamically adjusts defensive actions, including flagging, blocking or monitoring traffic, based on evolving threat levels. Experimental results demonstrate the model's effectiveness, achieving high detection accuracy and sensitivity. Additionally, we analyze how the system adapts over time, becoming more confident in its decision-making and optimizing security enforcement. This work enhances SDV cybersecurity by introducing a learning-based adaptive intrusion response system aiming at mitigating threats in highly dynamic vehicular networks.