Threat analysis and risk assessment for connected vehicles: A survey

F Luo, Y Jiang, Z Zhang, Y Ren… - Security and …, 2021 - Wiley Online Library
With the rapid development of connected vehicles, people can get a better driving
experience. However, the interconnection with the external network may bring growing …

Cybersecurity risk assessment for medium-risk drones: a systematic literature review

RCJ Alexandre, LEG Martins… - IEEE Aerospace and …, 2023 - ieeexplore.ieee.org
The increased demand for remotely piloted aircraft systems (RPAS) beyond visual line-of-
sight operations gives rise to a set of concerns regarding cybersecurity that, if not addressed …

Assessing cyber risk in cyber-physical systems using the ATT&CK framework

A Amro, V Gkioulos, S Katsikas - ACM Transactions on Privacy and …, 2023 - dl.acm.org
Autonomous transport is receiving increasing attention, with research and development
activities already providing prototype implementations. In this article we focus on …

Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP‐Based Approach

A Kazeminajafabadi, M Imani - IET Information Security, 2024 - Wiley Online Library
The increasing interconnectivity in our infrastructure poses a significant security challenge,
with external threats having the potential to penetrate and propagate throughout the …

Vsrq: Quantitative assessment method for safety risk of vehicle intelligent connected system

T Zhang, W Guan, H Miao, X Huang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The field of intelligent connectivity in modern vehicles continues to expand, with vehicle
functions becoming increasingly complex over time. This expansion has led to numerous …

[HTML][HTML] Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation

NH Nguyen, M Ge, JH Cho, TJ Moore, S Yoon… - Computers & …, 2025 - Elsevier
Abstract Autonomous Vehicles (AVs) integrate numerous control units, network components,
and protocols to operate effectively and interact with their surroundings, such as pedestrians …

Dynamic logic-based attack graph for risk assessment in complex computer systems

A Boudermine, R Khatoun, JH Choyer - Computer Networks, 2023 - Elsevier
Abstract Nowadays, Information and Communication Technologies (ICT) play a significant
role in our modern daily life. Computer networks breakdown can strongly impact everything …

Defining Cyber Risk Scenarios to Evaluate IoT Systems

R Andrade, I Ortiz, M Cazares, G Navas… - Games, 2022 - mdpi.com
The growth of the Internet of Things (IoT) has accelerated digital transformation processes in
organizations and cities. However, it has also opened new security challenges due to the …

Misbehavior detection in ephemeral networks: A local voting game in presence of uncertainty

A Behfarnia, A Eslami - IEEE Access, 2019 - ieeexplore.ieee.org
Emerging short-lived (ephemeral) connections between wireless mobile devices have
raised concerns over the security of ephemeral networks. An important security challenge in …

Intrusion detection method for GPS based on deep learning for autonomous vehicle

B Manale, T Mazri - International Journal of Electronic …, 2022 - inderscienceonline.com
Protecting an environment in perpetual motion will be difficult to be secured against attacks,
and also challenging to detect threats. The intrusion will result in serious security risks. With …