2020 5th International Conference on Computing, Communication and Security (ICCCS) 2020
DOI: 10.1109/icccs49678.2020.9277449
|View full text |Cite
|
Sign up to set email alerts
|

On-Board Diagnostics and Driver Profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The Android application receives data through Bluetooth from the car's ECU via the OBD-II adapter. This hexadecimal data is processed by the Android app to generate the DTCs or fault codes, which are then shown to the user [7]. The Table.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Android application receives data through Bluetooth from the car's ECU via the OBD-II adapter. This hexadecimal data is processed by the Android app to generate the DTCs or fault codes, which are then shown to the user [7]. The Table.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The results of the different examined algorithms indicated that for this specific dataset the RF approach performed in the best way [ 18 ]. Also, a similar approach was performed by Navneeth et al [ 19 ] who, through an OBD II connector and a smartphone, collected data and analyzed them using ML and especially the K-nearest neighbors (KNN) algorithm in order to cluster the driver behaviour and calculate a score which indicates how risky the driver’s behaviour is. Carvalho et al [ 20 ] utilized only data that can be collected via the smartphone’s sensors such as acceleration, position, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Empirical studies examining the amount of human influence in the field of IT security are lacking [18]. Some existing empirical studies have analyzed user perception, behaviour, and attitude towards computer ethics and information security [3][4][5] because computer security and ethics are the essential components of a management information system [6]. Navneeth et al [5] examined the driver's profile and behaviour.…”
Section: Introductionmentioning
confidence: 99%
“…Some existing empirical studies have analyzed user perception, behaviour, and attitude towards computer ethics and information security [3][4][5] because computer security and ethics are the essential components of a management information system [6]. Navneeth et al [5] examined the driver's profile and behaviour. Ameen et al [6] identified driving behaviours to reduce the risk of accidents based on real-time data recorded from vehicles and reference data provided by previous researchers.…”
Section: Introductionmentioning
confidence: 99%