[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …
An overview of attacks and defences on intelligent connected vehicles
Cyber security is one of the most significant challenges in connected vehicular systems and
connected vehicles are prone to different cybersecurity attacks that endanger passengers' …
connected vehicles are prone to different cybersecurity attacks that endanger passengers' …
The internet of things: New interoperability, management and security challenges
The Internet of Things (IoT) brings connectivity to about every objects found in the physical
space. It extends connectivity to everyday objects. From connected fridges, cars and cities …
space. It extends connectivity to everyday objects. From connected fridges, cars and cities …
Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques
HM Salmon, CM De Farias, P Loureiro… - International journal of …, 2013 - Springer
An IDS framework inspired in the Human Immune System to be applied in the wireless
sensor network context is proposed. It uses an improved decentralized and customized …
sensor network context is proposed. It uses an improved decentralized and customized …
Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
The wireless sensor networks (WSNs) are being deployed frequently in variety of
environments such as military surveillance, forest fire monitoring, chemical leakage …
environments such as military surveillance, forest fire monitoring, chemical leakage …
An intrusion detection system for critical information infrastructures using wireless sensor network technologies
L Coppolino, S D'Antonio, L Romano… - 2010 5th international …, 2010 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) technology is being increasingly used for data collection in
Critical Infrastructures (CIs). The paper presents an Intrusion Detection System (IDS), which …
Critical Infrastructures (CIs). The paper presents an Intrusion Detection System (IDS), which …
LS-LEACH: a new secure and energy efficient routing protocol for wireless sensor networks
M Alshowkan, K Elleithy… - 2013 IEEE/ACM 17th …, 2013 - ieeexplore.ieee.org
Wireless sensor networks are facing many challenges such as the limited resource in
processing power, storage and energy. The limited energy resource is one of the main …
processing power, storage and energy. The limited energy resource is one of the main …
Intrusion detection based on traffic analysis in wireless sensor networks
Y Ponomarchuk, DW Seo - The 19th Annual Wireless and …, 2010 - ieeexplore.ieee.org
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion
detection method for wireless sensor networks (WSNs), containing a large number of nodes …
detection method for wireless sensor networks (WSNs), containing a large number of nodes …
Адаптивное обнаружение уязвимостей интерфейсов беспилотных транспортных средств
АВ Скатков, АА Брюховецкий, ЮВ Доронина… - 2020 - elibrary.ru
Основу данной монографии составляет материал, полученный в научно-
исследовательской лаборатории «Интеллектуальных информационных систем и …
исследовательской лаборатории «Интеллектуальных информационных систем и …
On handling insider attacks in wireless sensor networks
C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …
challenging security problems are insider attacks. In this article we present security …