Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy

G Karopoulos, G Kambourakis, E Chatzoglou… - Electronics, 2022 - mdpi.com
Breaches in the cyberspace due to cyber-physical attacks can harm the physical space, and
any type of vehicle is an alluring target for wrongdoers for an assortment of reasons …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

[HTML][HTML] Cyber attack detection for self-driving vehicle networks using deep autoencoder algorithms

FW Alsaade, MH Al-Adhaileh - Sensors, 2023 - mdpi.com
Connected and autonomous vehicles (CAVs) present exciting opportunities for the
improvement of both the mobility of people and the efficiency of transportation systems. The …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

5G vehicle-to-everything at the cross-borders: security challenges and opportunities

A Boualouache, B Brik, Q Tang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development
of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and …

Cyber risk assessment and optimization: A small business case study

M Tsiodra, S Panda, M Chronopoulos… - IEEE Access, 2023 - ieeexplore.ieee.org
Assessing and controlling cyber risk is the cornerstone of information security management,
but also a formidable challenge for organisations due to the uncertainties associated with …

Privacy impact assessment of cyber attacks on connected and autonomous vehicles

S Panda, E Panaousis, G Loukas… - Proceedings of the 18th …, 2023 - dl.acm.org
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …

Collaborative Vehicular Threat Sharing: A Long-Term Contract-Based Incentive Mechanism With Privacy Preservation

C He, Y Wang, J Hu, TH Luan, Y Bi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of the Internet of Vehicles (IoV) has spurred innovations in Intelligent
Transportation Systems (ITS), but it also faces increasingly sophisticated cybersecurity …