Skip to main content
. 2022 Feb 10;22(4):1340. doi: 10.3390/s22041340

Table 2.

Comparison of the HDL-IDS with the state-of-the-art models.

Authors Dataset Attack Detection Mechanism
Ashraf et al. [34] Car Hack and UNSWNB15 LSTM
Injadat et al. [35] CICIDS 2017 and UNSW-NB 2015 NIDS
Anbalagan et al. [37] Network traffic ANN base SD-IoV
Nie et al. [38] Network traffic CNN
Olufowobi et al. [39] CAN SAIDuCANT
Zhang et al. [40] NSL-KDD Deep Belief Network (DBN)
Kang et al. [41] CAN DBN
Proposed Study Combined DDoS and Car Hack2020 HDL-IDS