Assessing aircraft security: A comprehensive survey and methodology for evaluation
The sophistication and complexity of cyber attacks and the variety of targeted platforms have
grown in recent years. Adversaries are targeting a wide range of platforms, eg, enterprise …
grown in recent years. Adversaries are targeting a wide range of platforms, eg, enterprise …
Advancements in Detection and Mitigation: Fortifying Against APTs-A Comprehensive Review
Organizations' cyber security posture is severely challenged by Advanced Persistent Threats
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research
COSPAS-SARSAT is an International programme for" Search and Rescue"(SAR) missions
based on the" Satellite Aided Tracking" system (SARSAT). It is designed to provide accurate …
based on the" Satellite Aided Tracking" system (SARSAT). It is designed to provide accurate …
Towards a unified cybersecurity testing lab for satellite, aerospace, avionics, maritime, drone (SAAMD) technologies and communications
Aviation, maritime, and aerospace traffic control, radar, communication, and software
technologies received increasing attention in the research literature over the past decade …
technologies received increasing attention in the research literature over the past decade …
[HTML][HTML] Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains
The maritime industry is constantly evolving and posing new challenges, especially with
increasing digitalization, which has raised concerns about cyber-attacks on maritime supply …
increasing digitalization, which has raised concerns about cyber-attacks on maritime supply …
Security issues in special-purpose digital radio communication systems: A systematic review
M Dansarie - IEEE Access, 2024 - ieeexplore.ieee.org
For applications where general-purpose communication systems, such as mobile telephony,
do not satisfy user requirements, special-purpose digital wireless communication standards …
do not satisfy user requirements, special-purpose digital wireless communication standards …
Maritime Autonomous Surface Ships: A Review of Cybersecurity Challenges, Countermeasures, and Future Perspectives
N Tabish, T Chaur-Luh - IEEE Access, 2024 - ieeexplore.ieee.org
Maritime Autonomous Surface Ships (MASS) have brought a transformative wave in the
marine industry, yielding unprecedented operational advancements and efficiency gains …
marine industry, yielding unprecedented operational advancements and efficiency gains …
Research on anomaly network detection based on self-attention mechanism
W Hu, L Cao, Q Ruan, Q Wu - Sensors, 2023 - mdpi.com
Network traffic anomaly detection is a key step in identifying and preventing network security
threats. This study aims to construct a new deep-learning-based traffic anomaly detection …
threats. This study aims to construct a new deep-learning-based traffic anomaly detection …
Emerging Trends in Cybersecurity for Critical Infrastructure Protection: A Comprehensive Review
SA Daniel, SS Victor - Computer Science & IT Research Journal, 2024 - fepbl.com
As critical infrastructure becomes increasingly interconnected and digitized, the need for
robust cybersecurity measures to safeguard essential systems is more pressing than ever …
robust cybersecurity measures to safeguard essential systems is more pressing than ever …
Assessing Maintainability Risks in the Open Source Software Supply Chain: An Empirical Quality Approach
F Bi, S Zhao, W Wang, S Wu - 2024 IEEE 48th Annual …, 2024 - ieeexplore.ieee.org
The maintainability of open-source supply chain software is crucial for ensuring the security
and efficiency of software systems. This research will focus on this area by identifying …
and efficiency of software systems. This research will focus on this area by identifying …