LEChain: A blockchain-based lawful evidence management scheme for digital forensics
Lawful evidence management in digital forensics is of paramount importance in police
investigations because such evidence is used to convict suspects of crimes. Existing studies …
investigations because such evidence is used to convict suspects of crimes. Existing studies …
Distributed intelligence in the internet of things: Challenges and opportunities
Widespread adoption of smart IoT devices is accelerating research for new techniques to
make IoT applications secure, scalable, energy-efficient, and capable of working in mission …
make IoT applications secure, scalable, energy-efficient, and capable of working in mission …
Security considerations for Internet of Things: A survey
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
Roadmap for cybersecurity in autonomous vehicles
VK Kukkala, SV Thiruloga… - IEEE Consumer …, 2022 - ieeexplore.ieee.org
Autonomous vehicles are on the horizon and will be transforming transportation safety and
comfort. These vehicles will be connected to various external systems and utilize advanced …
comfort. These vehicles will be connected to various external systems and utilize advanced …
Cybersecurity attacks in vehicular sensors
Z El-Rewini, K Sadatsharan, N Sugunaraj… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …
CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection
The Controller Area Network (CAN) is a ubiquitous bus protocol present in the
Electrical/Electronic (E/E) systems of almost all vehicles. It is vulnerable to a range of attacks …
Electrical/Electronic (E/E) systems of almost all vehicles. It is vulnerable to a range of attacks …
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols
The large number of Electronic Control Units (ECUs) mounted on modern cars and their
expansive communication capabilities create a substantial attack surface for potential …
expansive communication capabilities create a substantial attack surface for potential …
Analyzing the efficiency of machine learning classifiers in hardware-based malware detectors
The emergence of promising Internet-of-things (IoT) empowered Consumer Electronic
devices resulted in their exhaustive proliferation across several safety-critical architectures …
devices resulted in their exhaustive proliferation across several safety-critical architectures …
DRAM-based authentication using deep convolutional neural networks
M Yue, N Karimian, W Yan… - IEEE Consumer …, 2020 - ieeexplore.ieee.org
Authentication is the act of proving that an integrated circuit (IC) is not counterfeit. One
application of a physical unclonable function (PUF) circuit is to authenticate the identity of …
application of a physical unclonable function (PUF) circuit is to authenticate the identity of …
Review of attacks on connected and autonomous vehicles (CAV) and their existing solutions
N Yadav, SA Ansar… - 2022 10th International …, 2022 - ieeexplore.ieee.org
Connected and automated vehicles (CAV) have proven to be a boon in recent years since it
is a probable method to reduce traffic congestion, emissions, and accidents. In recent …
is a probable method to reduce traffic congestion, emissions, and accidents. In recent …