Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Cybersecurity for autonomous vehicles: Review of attacks and defense
As technology has evolved, cities have become increasingly smart. Smart mobility is a
crucial element in smart cities, and autonomous vehicles are an essential part of smart …
crucial element in smart cities, and autonomous vehicles are an essential part of smart …
Cyber-physical systems security—A survey
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
Adversarial sensor attack on lidar-based perception in autonomous driving
In Autonomous Vehicles (AVs), one fundamental pillar is perception, which leverages
sensors like cameras and LiDARs (Light Detection and Ranging) to understand the driving …
sensors like cameras and LiDARs (Light Detection and Ranging) to understand the driving …
In-vehicle network intrusion detection using deep convolutional neural network
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
Comprehensive experimental analyses of automotive attack surfaces
Modern automobiles are pervasively computerized, and hence potentially vulnerable to
attack. However, while previous research has shown that the internal networks within some …
attack. However, while previous research has shown that the internal networks within some …
Dolphinattack: Inaudible voice commands
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …
popular human-computer interaction method, and have turned various systems into voice …
Potential cyberattacks on automated vehicles
J Petit, SE Shladover - IEEE Transactions on Intelligent …, 2014 - ieeexplore.ieee.org
Vehicle automation has been one of the fundamental applications within the field of
intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For …
intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For …
Cyber threats facing autonomous and connected vehicles: Future challenges
Vehicles are currently being developed and sold with increasing levels of connectivity and
automation. As with all networked computing devices, increased connectivity often results in …
automation. As with all networked computing devices, increased connectivity often results in …
[HTML][HTML] Cybersecurity challenges in vehicular communications
Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …
Everything (V2X) communication technologies mature, the necessity to secure …