[HTML][HTML] A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

[HTML][HTML] Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

Adoption of cloud computing as innovation in the organization

L Golightly, V Chang, QA Xu, X Gao… - International Journal of …, 2022 - journals.sagepub.com
Over the years, there has been a heavy reliance on cloud computing as IT has innovated
through time. In recent times cloud computing has grown monumentally. Many organizations …

A systematic review on security attacks and countermeasures in automotive ethernet

M De Vincenzi, G Costantino, I Matteucci… - ACM Computing …, 2024 - dl.acm.org
In the past years, the automotive industry has experienced a technological revolution driven
by the increasing demand of connectivity and data to develop driver-assistance systems and …

An integrated approach of threat analysis for autonomous vehicles perception system

S Ghosh, A Zaboli, J Hong, J Kwon - IEEE Access, 2023 - ieeexplore.ieee.org
Automated vehicles are a revolutionary step in mobility, providing a safe and convenient
riding experience while kee** the human-driving task minimal to none. Therefore, these …

Review of electrical and electronic architectures for autonomous vehicles: Topologies, networking and simulators

W Wang, K Guo, W Cao, H Zhu, J Nan, L Yu - Automotive Innovation, 2024 - Springer
With the rapid development of autonomous vehicles, more and more functions and
computing requirements have led to the continuous centralization in the topology of …

Security on in-vehicle communication protocols: Issues, challenges, and future research directions

A Martínez-Cruz, KA Ramírez-Gutiérrez… - Computer …, 2021 - Elsevier
The automotive industry has represented an important sector of industrial development
worldwide. With technology growth, vehicles have been equipped with various devices that …

Next generation intra-vehicle backbone network architectures

O Alparslan, S Arakawa… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
Increasing bandwidth requirements in vehicles are pushing the backbone architectures to
use faster switching technologies like Ethernet. However, the traditional Ethernet cannot …

Flow based containerized honeypot approach for network traffic analysis: An empirical study

SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …

Secure time-sensitive software-defined networking in vehicles

T Häckel, P Meyer, F Korf… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Current designs of future In-Vehicle Networks (IVN) prepare for switched Ethernet
backbones, which can host advanced LAN technologies such as IEEE Time-Sensitive …