Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy
Breaches in the cyberspace due to cyber-physical attacks can harm the physical space, and
any type of vehicle is an alluring target for wrongdoers for an assortment of reasons …
any type of vehicle is an alluring target for wrongdoers for an assortment of reasons …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
[HTML][HTML] Cyber attack detection for self-driving vehicle networks using deep autoencoder algorithms
FW Alsaade, MH Al-Adhaileh - Sensors, 2023 - mdpi.com
Connected and autonomous vehicles (CAVs) present exciting opportunities for the
improvement of both the mobility of people and the efficiency of transportation systems. The …
improvement of both the mobility of people and the efficiency of transportation systems. The …
A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
5G vehicle-to-everything at the cross-borders: security challenges and opportunities
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development
of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and …
of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and …
Cyber risk assessment and optimization: A small business case study
M Tsiodra, S Panda, M Chronopoulos… - IEEE Access, 2023 - ieeexplore.ieee.org
Assessing and controlling cyber risk is the cornerstone of information security management,
but also a formidable challenge for organisations due to the uncertainties associated with …
but also a formidable challenge for organisations due to the uncertainties associated with …
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …
in serious consequences, including cyber-physical and privacy risks. For example, an …
Collaborative Vehicular Threat Sharing: A Long-Term Contract-Based Incentive Mechanism With Privacy Preservation
The rapid development of the Internet of Vehicles (IoV) has spurred innovations in Intelligent
Transportation Systems (ITS), but it also faces increasingly sophisticated cybersecurity …
Transportation Systems (ITS), but it also faces increasingly sophisticated cybersecurity …