Autonomous Cars

Autonomous Cars

Photo illust. US DoD, AIr Force

Most cybersecurity vulnerabilities today are unknown until an attack takes place, as conventional cybersecurity measures can only detect and prevent known threats. AI-based anomaly...
unmanned systems

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
Photo illustration NASA

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
illustration

In an effort to utilize defense technology for civilian use, a giant automobile corporation has purchased a small defense technology contractor in order to...
Photo illust. US Navy, Wikimedia

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
Photo illust. Johns Hopkins University Applied Physics Laboratory

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
robotics

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019.Register!Representatives from government, leading defense industries, military, security forces and law...
Photo illustration US Navy

During the last three years, there has been a quantum leap in global UAV development and innovation: 80% of the patents published globally on...
Photo illustration US DVIDS

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
driverless trucks

Long-haul routes are well suited for self-driving trucks because they are normally accomplished with driving teams of two. Haulage operators find that driving teams...

Augmented reality and virtual reality technology is expected to be a multi-billion dollar industry for the US government by 2021. Augmented reality technology is...

GPS spoofing is a malicious attack that broadcasts incorrect signals to deceive GPS receivers, while GPS manipulation modifies a real GPS signal. GPS satellites...

The application of autonomous vehicles has grown dramatically in recent years. Two major functions of autonomous vehicles are positioning and path planning. An indoor...
autonomous car

Researchers at Florida Polytechnic University are creating newly invented cyber attacks as a way to improve the security of cyber-physical systems (CPS). CPSs are...

Deep-learning algorithms excel at using shapes and color to recognize the differences between humans and animals or cars and trucks, for example. These systems...
cybersecurity

As cyber-physical systems (CPS), such as autonomous vehicles, robotic systems, smart grid and unmanned aerial vehicles are becoming more complex, they also grow increasingly...
smartest road

The local municipalities in Finland and Finnish businesses are planning to build the world’s smartest road. The project will create a 5G network along...
dual-use technology

LiDAR sensors used on driverless cars measure the distance to target objects by illuminating them with laser light and measuring the reflected pulses. However,...
quantum encryption

In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
autonomous cars

Autonomous cars are still being developed, and this means that an ever growing quantity of data is a massed through cars' navigational technologies. Recently,...

As concerns over security risks for connected vehicles continue to build, an automotive cybersecurity company believes that a branch of machine learning called unsupervised...

Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...

iHLS Events