[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey

M Dibaei, X Zheng, K Jiang, R Abbas, S Liu… - Digital Communications …, 2020 - Elsevier
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …

An overview of attacks and defences on intelligent connected vehicles

M Dibaei, X Zheng, K Jiang, S Maric, R Abbas… - arxiv preprint arxiv …, 2019 - arxiv.org
Cyber security is one of the most significant challenges in connected vehicular systems and
connected vehicles are prone to different cybersecurity attacks that endanger passengers' …

The internet of things: New interoperability, management and security challenges

M Elkhodr, S Shahrestani, H Cheung - arxiv preprint arxiv:1604.04824, 2016 - arxiv.org
The Internet of Things (IoT) brings connectivity to about every objects found in the physical
space. It extends connectivity to everyday objects. From connected fridges, cars and cities …

Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques

HM Salmon, CM De Farias, P Loureiro… - International journal of …, 2013 - Springer
An IDS framework inspired in the Human Immune System to be applied in the wireless
sensor network context is proposed. It uses an improved decentralized and customized …

Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information

M Tiwari, KV Arya, R Choudhari… - … on Computer Sciences …, 2009 - ieeexplore.ieee.org
The wireless sensor networks (WSNs) are being deployed frequently in variety of
environments such as military surveillance, forest fire monitoring, chemical leakage …

An intrusion detection system for critical information infrastructures using wireless sensor network technologies

L Coppolino, S D'Antonio, L Romano… - 2010 5th international …, 2010 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) technology is being increasingly used for data collection in
Critical Infrastructures (CIs). The paper presents an Intrusion Detection System (IDS), which …

LS-LEACH: a new secure and energy efficient routing protocol for wireless sensor networks

M Alshowkan, K Elleithy… - 2013 IEEE/ACM 17th …, 2013 - ieeexplore.ieee.org
Wireless sensor networks are facing many challenges such as the limited resource in
processing power, storage and energy. The limited energy resource is one of the main …

Intrusion detection based on traffic analysis in wireless sensor networks

Y Ponomarchuk, DW Seo - The 19th Annual Wireless and …, 2010 - ieeexplore.ieee.org
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion
detection method for wireless sensor networks (WSNs), containing a large number of nodes …

Адаптивное обнаружение уязвимостей интерфейсов беспилотных транспортных средств

АВ Скатков, АА Брюховецкий, ЮВ Доронина… - 2020 - elibrary.ru
Основу данной монографии составляет материал, полученный в научно-
исследовательской лаборатории «Интеллектуальных информационных систем и …

On handling insider attacks in wireless sensor networks

C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …