, l'encodeur convertit les entrées présentées à l'algorithme en vecteurs binaires de taille fixe

. L'algorithme-de-la-représentation-spatiale, représenté en turquoise sur la figure, déclenche à partir de la SDR de l'entrée, l'activation d'une petite quantité de mini-colonnes du réseau de neurones. L'ensemble des minicolonnes du réseau est représenté sous la forme d'une autre SDR où les bits actifs représentent les mini

L. , représenté en jaune sur la figure, apprend les séquences de l'activation des mini-colonnes et effectue des prédictions sur l'état futur du réseau. Il produit donc une SDR représentant les mini-colonnes dont l'activité à l

, Dans notre cas, nous utilisons une fonction qui calcule le score d'anormalité d'une entrée en comparant la SDR produite par la représentation spatiale à l'instant (t) et la SDR prédite à l

, Nous détaillons dans la suite de cette annexe les algorithmes de la représentation spatiale et de la mémoire temporelle ainsi que les paramètres qui les régissent

, 2 L'algorithme de la représentation spatiale Nous commençons donc par détailler le fonctionnement de l'algorithme de la représentation spatiale

, L'espace des entrées dans HTM est représenté par un vecteur dont la dimension est équivalente à celle des SDRs produites par l'encodeur

, Ce processus est décrit par la Figure B.2. Dans cette figure, l'espace des entrées est représenté sous la forme d'une matrice binaire destinée à recevoir les SDRs provenant de l'encodeur. Les bits actifs de la SDR sont représentés par des rectangles pleins. Les connexions proximales sont représentées par des flèches liant une cellule à plusieurs bits de l'espace des entrées, L'algorithme de la représentation spatiale a pour rôle de déclencher l'activation des cellules du réseau de neurones lorsque celles-ci sont connectées à des bits actifs dans l'espace des entrées

, En effet, un mécanisme d'inhibition est implémenté afin que les mini-colonnes ayant le plus de connexions actives avec l'espace des données soient favorisées. L'algorithme utilise plusieurs mécanismes afin de renforcer, réduire, ou créer les connexions proximales entre les cellules et l'espace des entrées et peut être résumé B.6 Hyper-paramètres utilisés dans notre étude { 'model': 'HTMPrediction', 'modelParams': { 'clParams': { 'alpha': 0.01962508905154251, 'regionName': 'SDRClassifierRegion', 'steps': '1,5'}, 'inferenceType': 'TemporalAnomaly', 'spEnable': True, 'spParams': { 'columnCount': 2048, 'globalInhibition': 1, Lorsqu'une cellule est connectée à un nombre suffisant de bits actifs dans l'espace des données, p.20

. Beemer, Open Thyself! -Security vulnerabilities in BMW's Connected Drive

, Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957. html. (Cité en page 30

M. N. Adnan and M. Z. Islam, Forest pa : Constructing a decision forest by penalizing attributes used in previous trees, Expert Systems with Applications, vol.89, pp.389-403, 2017.

R. Agrawal, T. Imieli?ski, and A. Swami, Mining association rules between sets of items in large databases, Proceedings of the 1993 ACM SIGMOD international conference on Management of data, p.21, 1993.

S. Ahmad and J. Hawkins, Properties of sparse distributed representations and their application to hierarchical temporal memory, 2015.

S. Ahmad, A. Lavin, S. Purdy, and Z. Agha, Unsupervised real-time anomaly detection for streaming data, Neurocomputing, vol.262, pp.134-147, 2017.

A. Ahmim, L. Maglaras, M. A. Ferrag, M. Derdour, and H. Janicke, A novel hierarchical intrusion detection system based on decision tree and rules-based models, 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), p.24, 2019.

S. A. Mamun and J. Valimaki, Anomaly detection and classification in cellular networks using automatic labeling technique for applying supervised learning, Procedia Computer Science, vol.140, p.36, 2018.

I. Almomani, B. Al-kasasbeh, and M. Al-akhras, Wsn-ds : A dataset for intrusion detection systems in wireless sensor networks, Journal of Sensors, 2016.

M. Aloqaily, S. Otoum, I. Ridhawi, and Y. Jararweh, An intrusion detection system for connected vehicles in smart cities, Ad Hoc Networks, vol.90, p.36, 2019.

D. Ariu, R. Tronci, and G. Giacinto, Hmmpayl : An intrusion detection system based on hidden markov models. computers & security, vol.30, p.19, 2011.

, AWID : Awid-wireless security datasets project

L. E. Baum, T. Petrie, G. Soules, and N. Weiss, A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics, vol.41, p.19, 1970.

A. Bazzi, B. M. Masini, and A. Zanella, Performance analysis of v2v beaconing using lte in direct mode with full duplex radios, IEEE Wireless Communications Letters, vol.4, issue.6, p.29, 2015.

A. Bazzi, B. M. Masini, A. Zanella, and I. Thibault, Beaconing from connected vehicles : Ieee 802.11 p vs. lte-v2v, IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), p.29, 2016.

R. Berthier and W. H. Sanders, Specification-based intrusion detection for advanced metering infrastructures, 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, p.16, 2011.

P. Borazjani, C. Everett, and D. Mccoy, Octane : An extensible open source car security testbed, Proceedings of the Embedded Security in Cars Conference, vol.34, 2014.

, Bosch : Specification can, p.13, 1991.

E. Bou-harb, M. Debbabi, and C. Assi, Cyber scanning : a comprehensive survey, Ieee communications surveys & tutorials, vol.16, issue.3, pp.1496-1519, 2013.

R. Buschkes, D. Kesdogan, and P. Reichl, How to increase security in mobile networks by anomaly detection, Proceedings 14th Annual Computer Security Applications Conference (Cat. No. 98EX217), p.16, 1998.

Z. Cai, A. Wang, W. Zhang, and M. Gruffke, Schweppe : 0-days & mitigations : Roadways to exploit and secure connected bmw cars, Black Hat USA, p.32, 2019.

P. Casas, J. Mazel, and P. Owezarski, Unada : Unsupervised network anomaly detection using sub-space outliers ranking, International Conference on Research in Networking, p.23, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01583411

G. Chan, F. Chua, and C. Lee, Intrusion detection and prevention of web service attacks for software as a service : Fuzzy association rules vs fuzzy associative patterns, Journal of Intelligent & Fuzzy Systems, vol.31, issue.2, p.22, 2016.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection : A survey, ACM computing surveys (CSUR), vol.41, issue.3, p.15, 2009.

D. Chandramouli, R. Liebhart, and J. Pirskanen, 5G for the Connected World, p.29, 2019.

G. Chandrashekar and F. Sahin, A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014.

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, p.28

D. Chicco and G. Jurman, The advantages of the matthews correlation coefficient (mcc) over f1 score and accuracy in binary classification evaluation, BMC genomics, vol.21, issue.1, p.109, 2020.

, Computest : The connected car-ways to get unauthorized access and potential implications, vol.32, 2018.

A. Computing, An architectural blueprint for autonomic computing, p.71, 2006.

G. Creech, Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks

J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Networks, vol.90, p.101823, 2019.

Y. Cui, S. Ahmad, and J. Hawkins, Continuous online sequence learning with an unsupervised neural network model, Neural computation, vol.28, issue.11, p.56, 2016.

Y. Cui, S. Ahmad, and J. Hawkins, The htm spatial pooler-a neocortical algorithm for online sparse distributed coding, Frontiers in computational neuroscience, vol.11, issue.111, p.57, 2017.

F. D. Da-cunha, A. Boukerche, L. Villas, A. C. Viana, and A. A. , Loureiro : Data communication in vanets : a survey, challenges and applications, p.14, 2014.

Z. Deng, X. Zhu, D. Cheng, M. Zong, and S. Zhang, Efficient knn classification algorithm for big data, Neurocomputing, vol.195, pp.143-148, 2016.

M. Dibaei, X. Zheng, K. Jiang, S. Maric, R. Abbas et al., An overview of attacks and defences on intelligent connected vehicles, p.33, 2019.

J. R. Douceur, The sybil attack, International Workshop on Peer-to-Peer Systems, p.29, 2002.

J. Dromard, G. Roudière, and P. Owezarski, Online and scalable unsupervised network anomaly detection method, IEEE Transactions on Network and Service Management, vol.14, issue.1, pp.34-47, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01406273

R. C. Eberhart and Y. Shi, Comparing inertia weights and constriction factors in particle swarm optimization, Proceedings of the 2000 congress on evolutionary computation. CEC00 (Cat. No. 00TH8512), vol.1, p.98, 2000.

M. H. Eiza and Q. Ni, Driving with sharks : Rethinking connected vehicles with vehicle cybersecurity, IEEE Vehicular Technology Magazine, vol.12, issue.2, p.37, 2017.

G. Fernandes, L. F. Carvalho, J. J. Rodrigues, and M. L. Proença, Network anomaly detection using ip flows with principal component analysis and ant colony optimization, Journal of Network and Computer Applications, vol.64, pp.1-11, 2016.

G. D. Forney, The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, p.19, 1973.

I. Foster, A. Prudhomme, K. Koscher, and S. Savage, Fast and vulnerable : A story of telematic failures, 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), p.29, 2015.

S. R. Gaddam, V. V. Phoha, and K. S. , Balagani : K-means+ id3 : A novel method for supervised anomaly detection by cascading k-means clustering and id3 decision tree learning methods, IEEE transactions on knowledge and data engineering, vol.19, issue.3, p.23, 2007.

M. Gates, A. Tirumala, J. Ferguson, J. Dugan, F. Qin et al., , p.81, 2003.

P. Geurts, D. Ernst, and L. Wehenkel, Extremely randomized trees. Machine learning, vol.63, pp.3-42, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00341932

I. Goodfellow, Y. Bengio, and A. Courville, Deep learning, vol.55, 2016.

B. Greenshields, J. Bibbins, W. Channing, and H. Miller, A study of traffic capacity, Highway research board proceedings, vol.1935, p.35, 1935.

T. R. Gruber, A translation approach to portable ontology specifications. Knowledge acquisition, vol.5, p.67, 1993.

Z. Hasani, Robust anomaly detection algorithms for real-time big data : Comparison of algorithms, 6th Mediterranean Conference on Embedded Computing (MECO), p.56, 2017.

H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, Vanet security challenges and solutions : A survey, Vehicular Communications, vol.7, p.29, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01532780

D. M. Hawkins, The problem of overfitting, Journal of chemical information and computer sciences, vol.44, issue.1, pp.1-12, 2004.

J. Hawkins and S. Ahmad, Why neurons have thousands of synapses, a theory of sequence memory in neocortex, Frontiers in neural circuits, vol.10, issue.23, p.61, 2016.

J. Hawkins and S. Blakeslee, On intelligence : How a new understanding of the brain will lead to the creation of truly intelligent machines. Macmillan, 2007.

S. Hochreiter and J. Schmidhuber, Long short-term memory, Neural computation, vol.9, issue.8, pp.1735-1780, 1997.

A. Javaid, Q. Niyaz, W. Sun, and M. Alam, A deep learning approach for network intrusion detection system, Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS), BICT'15, p.27, 2016.

A. Jurgelionis, J. Laulajainen, M. Hirvonen, and A. I. Wang, An empirical study of netem network emulation functionalities, 20th International Conference on Computer Communications and Networks (ICCCN), p.82, 2011.

M. Kang and J. Kang, Intrusion detection system using deep neural network for in-vehicle network security, PloS one, vol.11, issue.6, 2016.

G. K. Karagiannidis and A. S. , Lioumpas : An improved approximation for the gaussian q-function, IEEE Communications Letters, vol.11, issue.8, pp.644-646, 2007.

, KDD99 : KDD'99 Competition

J. O. Kephart and D. M. , Chess : The vision of autonomic computing, Computer, issue.1, p.71, 2003.

L. Khan, M. Awad, and B. Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB journal, vol.16, issue.4, pp.507-521, 2007.

L. Koc, T. A. Mazzuchi, and S. Sarkani, A network intrusion detection system based on a hidden naïve bayes multiclass classifier, Expert Systems with Applications, vol.39, issue.18, pp.13492-13500, 2012.

N. Kouiroukidis and G. Evangelidis, The effects of dimensionality curse in high dimensional knn search, 15th Panhellenic Conference on Informatics, vol.55, pp.41-45, 2011.

D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, Recent development and applications of SUMO -Simulation of Urban MObility, International Journal On Advances in Systems and Measurements, vol.5, issue.3&4, pp.128-138, 2012.

A. Lang, J. Dittmann, S. Kiltz, and T. Hoppe, Future perspectives : The car and its ip-address-a potential safety and security risk assessment, International Conference on Computer Safety, Reliability, and Security, p.15, 2007.

A. H. Lashkari, G. Draper-gil, M. S. Mamun, and A. A. Ghorbani, Characterization of tor traffic using time based features, ICISSP, pp.253-262, 2017.

M. Levi, Y. Allouche, and A. Kontorovich, Advanced analytics for connected car cybersecurity, IEEE 87th Vehicular Technology Conference (VTC Spring), vol.35, pp.1-7, 2018.

R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, The 1999 darpa off-line intrusion detection evaluation, Computer networks, vol.34, issue.4, pp.579-595, 2000.

R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall et al., Evaluating intrusion detection systems : The 1998 darpa off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, vol.2, pp.12-26, 2000.

R. Lübke, P. Büschel, D. Schuster, and A. Schill, Measuring accuracy and performance of network emulators, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), p.82, 2014.

Z. Machardy, A. Khan, K. Obana, and S. Iwashina, V2x access technologies : Regulation, research, and remaining challenges, IEEE Communications Surveys & Tutorials, vol.20, issue.3, p.14, 2018.

B. W. Matthews, Comparison of the predicted and observed secondary structure of t4 phage lysozyme, Biochimica et Biophysica Acta, vol.405, issue.2, p.109, 1975.

S. Mazloom, M. Rezaeirad, A. Hunter, and D. Mccoy, A security analysis of an in-vehicle infotainment and app platform, vol.30

C. Miller and C. Valasek, Adventures in automotive networks and control units, vol.21, p.31, 2013.

C. Miller and C. Valasek, A survey of remote automotive attack surfaces. black hat USA, p.28, 2014.

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, 2015.

A. H. Mirza and S. Cosan, Computer network intrusion detection using sequential lstm neural networks autoencoders, 26th Signal Processing and Communications Applications Conference (SIU), vol.55, pp.1-4, 2018.

D. Moon, H. Im, I. Kim, and J. H. Park, Dtb-ids : an intrusion detection system based on decision tree using behavior analysis for preventing apt attacks, The Journal of supercomputing, vol.73, issue.7, p.23, 2017.

T. K. Moon, The expectation-maximization algorithm. IEEE Signal processing magazine, vol.13, p.19, 1996.

T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu et al., A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection, vol.4, issue.2, pp.88-103, 2011.

N. Moustafa and J. Slay, Unsw-nb15 : a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set), 2015 military communications and information systems conference (MilCIS), pp.1-6, 2015.

G. Münz, S. Li, and G. Carle, Traffic anomaly detection using k-means clustering, GI/ITG Workshop MMBnet, p.22, 2007.

K. Nasr, A. Abou-el-kalam, and C. Fraboul, Performance analysis of wireless intrusion detection systems, International Conference on Internet and Distributed Computing Systems, p.109, 2012.

J. C. Neumann, The book of GNS3 : build virtual network labs using Cisco, Juniper, and more, p.81, 2015.

, NHTSA : Cybersecurity Best Practices for Modern Vehicles

S. Nie, L. Liu, and Y. Du, Free-fall : Hacking tesla from wireless to can bus, p.31

S. Nie, L. Liu, Y. Du, and W. Zhang, Over-the-air : how we remotely compromised the gateway, bcm, and autopilot ecus of tesla cars, p.31

N. F. Noy and D. L. Mcguinness, Ontology development 101 : A guide to creating your first ontology, p.67

L. Nussbaum and O. Richard, A comparative study of network link emulators, Proceedings of the 2009 Spring Simulation Multiconference, p.85, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00425613

P. Papadimitratos, on the road"-reflections on the security of vehicular communication systems, 2008 IEEE International Conference on Vehicular Electronics and Safety, pp.359-363, 2008.

S. Parkinson, P. Ward, K. Wilson, and J. Miller, Cyber threats facing autonomous and connected vehicles : Future challenges. IEEE transactions on intelligent transportation systems, vol.18, p.37, 2017.

K. Peng, V. Leung, L. Zheng, S. Wang, C. Huang et al., Intrusion detection system based on decision tree over big data in fog environment, p.24, 2018.

J. Petit and S. E. Shladover, Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent transportation systems, vol.16, pp.546-556, 2014.

S. Purdy, Encoding data for htm systems, 2016.

M. Raya and J. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, vol.15, issue.1, p.29, 2007.

Q. Ricard and P. Owezarski, Autobot : An emulation environment for cellular vehicular communications, Proceedings of the 2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02347361

Q. Ricard and P. Owezarski, Ontology based anomaly detection for cellular vehicular communications, 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020, p.2020
URL : https://hal.archives-ouvertes.fr/hal-02347432

G. F. Riley and T. R. Henderson, The ns-3 network simulator. In Modeling and tools for network simulation, pp.15-34, 2010.

G. Roudìere and P. Owezarski, Evaluating the impact of traffic sampling on aatac's ddos detection, Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, p.107, 2018.

S. L. , Salzberg : C4. 5 : Programs for machine learning by j. ross quinlan. morgan kaufmann publishers, inc, 1993.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSP, pp.108-116, 2018.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security, vol.31, pp.357-374, 2012.

J. Sliwinski, A. Beben, and P. Krawiec, Empath : Tool to emulate packet transfer characteristics in ip network, International Workshop on Traffic Monitoring and Analysis, p.82, 2010.

M. Sokolova, N. Japkowicz, and S. Szpakowicz, Beyond accuracy, f-score and roc : a family of discriminant measures for performance evaluation, Australasian joint conference on artificial intelligence, p.107, 2006.

R. Sommer and V. Paxson, Outside the closed world : On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010.

H. M. Song, H. R. Kim, and H. K. Kim, Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network, 2016 international conference on information networking (ICOIN), p.33, 2016.

J. Song, H. Takakura, and Y. Okabe, Cooperation of intelligent honeypots to detect unknown malicious codes, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing, pp.31-39, 2008.

N. Spruston, Pyramidal neurons : dendritic structure and synaptic integration, Nature Reviews Neuroscience, vol.9, issue.3, pp.206-221, 2008.

K. Stefanidis and A. G. , Voyiatzis : An hmm-based anomaly detection approach for scada systems, IFIP International Conference on Information Security Theory and Practice, vol.20, pp.85-99, 2016.

V. Sze, Y. Chen, T. Yang, and J. , Emer : Efficient processing of deep neural networks : A tutorial and survey, Proceedings of the IEEE, vol.105, issue.12, p.26, 2017.

A. Tajbakhsh, M. Rahmati, and A. Mirzaei, Intrusion detection using fuzzy association rules, Applied Soft Computing, vol.9, issue.2, p.21, 2009.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the kdd cup 99 data set, 2009 IEEE symposium on computational intelligence for security and defense applications, pp.1-6, 2009.

A. Theissler, Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowledge-Based Systems, vol.123, pp.163-173, 2017.

S. Ustebay, Z. Turgut, and M. A. Aydin, Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier, 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), p.25, 2018.

D. Van-ravenzwaaij, P. Cassey, and S. D. , Brown : A simple introduction to markov chain monte-carlo sampling, Psychonomic bulletin & review, vol.25, issue.1, p.19, 2018.

A. Varga and R. Hornig, An overview of the omnet++ simulation environment, Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, p.60

R. Vijayanand, D. Devaraj, and B. Kannapiran, Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection, Computers & Security, vol.77, pp.304-314, 2018.

R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-nemrat et al., Deep learning approach for intelligent intrusion detection system, IEEE Access, vol.7, p.26, 2019.

C. Wang, Z. Zhao, L. Gong, L. Zhu, Z. Liu et al., A distributed anomaly detection system for in-vehicle network using htm, IEEE Access, vol.6, pp.9091-9098, 2018.

K. Wevers and M. Lu, V2x communication for its-from ieee 802.11 p towards 5g, IEEE 5G Tech Focus, vol.1, issue.2, p.29, 2017.

S. Woo, H. J. Jo, and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can, IEEE Transactions on intelligent transportation systems, vol.16, issue.2, pp.993-1006, 2014.

J. Wu, W. Zeng, and F. Yan, Hierarchical temporal memory method for timeseries-based anomaly detection, Neurocomputing, vol.273, p.57, 2018.

Z. Xu, X. Li, X. Zhao, M. H. Zhang, and Z. Wang, Dsrc versus 4g-lte for connected vehicle applications : A study on field experiments of vehicular communication performance, Journal of Advanced Transportation, p.29, 2017.

C. Yin, Y. Zhu, and J. Fei, He : A deep learning approach for intrusion detection using recurrent neural networks, vol.5, p.26, 2017.

E. Yudkowsky, Artificial intelligence as a positive and negative factor in global risk, Global catastrophic risks, vol.1, issue.303, p.37, 2008.

K. Zaidi, M. B. Milojevic, V. Rakocevic, and A. Nallanathan, Rajarajan : Host-based intrusion detection for vanets : a statistical approach to rogue node detection, IEEE transactions on vehicular technology, vol.65, issue.8, p.35, 2015.

H. Zenati, M. Romain, C. Foo, B. Lecouat, and V. Chandrasekhar, Adversarially learned anomaly detection, 2018 IEEE International Conference on Data Mining (ICDM), p.27, 2018.

. Bibliographie,

Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong et al., Deepvcm : A deep learning based intrusion detection method in vanet, 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp.288-293, 2019.

B. Zhang, Z. Liu, Y. Jia, J. Ren, and X. Zhao, Network intrusion detection method based on pca and bayes algorithm. Security and Communication Networks, p.21, 2018.

Y. Zhou and G. Cheng, An efficient network intrusion detection system based on feature selection and ensemble classifier, 2019.