Threat analysis and risk assessment for connected vehicles: A survey
F Luo, Y Jiang, Z Zhang, Y Ren… - Security and …, 2021 - Wiley Online Library
With the rapid development of connected vehicles, people can get a better driving
experience. However, the interconnection with the external network may bring growing …
experience. However, the interconnection with the external network may bring growing …
Cybersecurity risk assessment for medium-risk drones: a systematic literature review
RCJ Alexandre, LEG Martins… - IEEE Aerospace and …, 2023 - ieeexplore.ieee.org
The increased demand for remotely piloted aircraft systems (RPAS) beyond visual line-of-
sight operations gives rise to a set of concerns regarding cybersecurity that, if not addressed …
sight operations gives rise to a set of concerns regarding cybersecurity that, if not addressed …
Assessing cyber risk in cyber-physical systems using the ATT&CK framework
Autonomous transport is receiving increasing attention, with research and development
activities already providing prototype implementations. In this article we focus on …
activities already providing prototype implementations. In this article we focus on …
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP‐Based Approach
A Kazeminajafabadi, M Imani - IET Information Security, 2024 - Wiley Online Library
The increasing interconnectivity in our infrastructure poses a significant security challenge,
with external threats having the potential to penetrate and propagate throughout the …
with external threats having the potential to penetrate and propagate throughout the …
Vsrq: Quantitative assessment method for safety risk of vehicle intelligent connected system
T Zhang, W Guan, H Miao, X Huang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The field of intelligent connectivity in modern vehicles continues to expand, with vehicle
functions becoming increasingly complex over time. This expansion has led to numerous …
functions becoming increasingly complex over time. This expansion has led to numerous …
[HTML][HTML] Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation
Abstract Autonomous Vehicles (AVs) integrate numerous control units, network components,
and protocols to operate effectively and interact with their surroundings, such as pedestrians …
and protocols to operate effectively and interact with their surroundings, such as pedestrians …
Dynamic logic-based attack graph for risk assessment in complex computer systems
A Boudermine, R Khatoun, JH Choyer - Computer Networks, 2023 - Elsevier
Abstract Nowadays, Information and Communication Technologies (ICT) play a significant
role in our modern daily life. Computer networks breakdown can strongly impact everything …
role in our modern daily life. Computer networks breakdown can strongly impact everything …
Defining Cyber Risk Scenarios to Evaluate IoT Systems
The growth of the Internet of Things (IoT) has accelerated digital transformation processes in
organizations and cities. However, it has also opened new security challenges due to the …
organizations and cities. However, it has also opened new security challenges due to the …
Misbehavior detection in ephemeral networks: A local voting game in presence of uncertainty
A Behfarnia, A Eslami - IEEE Access, 2019 - ieeexplore.ieee.org
Emerging short-lived (ephemeral) connections between wireless mobile devices have
raised concerns over the security of ephemeral networks. An important security challenge in …
raised concerns over the security of ephemeral networks. An important security challenge in …
Intrusion detection method for GPS based on deep learning for autonomous vehicle
Protecting an environment in perpetual motion will be difficult to be secured against attacks,
and also challenging to detect threats. The intrusion will result in serious security risks. With …
and also challenging to detect threats. The intrusion will result in serious security risks. With …