Cybersecurity for autonomous vehicles: Review of attacks and defense

K Kim, JS Kim, S Jeong, JH Park, HK Kim - Computers & security, 2021 - Elsevier
As technology has evolved, cities have become increasingly smart. Smart mobility is a
crucial element in smart cities, and autonomous vehicles are an essential part of smart …

A comprehensive survey on security challenges in different network layers in cloud computing

M Jangjou, MK Sohrabi - Archives of Computational Methods in …, 2022 - Springer
Conducting enterprise distributed computing and providing facilities such as data storage
and resource sharing, along with the provision of cheap, easy, and flexible services, have …

[HTML][HTML] Review of electric vehicle charger cybersecurity vulnerabilities, potential impacts, and defenses

J Johnson, T Berg, B Anderson, B Wright - Energies, 2022 - mdpi.com
Energies | Free Full-Text | Review of Electric Vehicle Charger Cybersecurity Vulnerabilities,
Potential Impacts, and Defenses Next Article in Journal Research on Stress Distribution …

[HTML][HTML] Cybersecurity in automotive: An intrusion detection system in connected vehicles

F Pascale, EA Adinolfi, S Coppola, E Santonicola - Electronics, 2021 - mdpi.com
Today's modern vehicles are connected to a network and are considered smart objects of
IoT, thanks to the capability to send and receive data from the network. One of the greatest …

Towards a security‐driven automotive development lifecycle

J Dobaj, G Macher, D Ekert, A Riel… - Journal of Software …, 2023 - Wiley Online Library
Cybersecurity has become one of the most crucial challenges in the automotive
development lifecycle. The upcoming ISO/SAE 21434 standard provides only a generic …

Security aspects in IoT based cloud computing

E Bazgir, E Haque, NB Sharif, MF Ahmed - World Journal of Advanced …, 2023 - wjarr.com
Cloud computing offers a flexible framework in which data and resources are spread across
different locations and can be accessed from various industrial environments. This …

Assessing cyber risk in cyber-physical systems using the ATT&CK framework

A Amro, V Gkioulos, S Katsikas - ACM Transactions on Privacy and …, 2023 - dl.acm.org
Autonomous transport is receiving increasing attention, with research and development
activities already providing prototype implementations. In this article we focus on …

[PDF][PDF] Adapting threat modeling methods for the automotive industry

A Karahasanovic, P Kleberger… - Proceedings of the 15th …, 2017 - academia.edu
We live in a world that is getting more interconnected by each day and we are witnessing a
global change where all the devices in our surroundings are becoming “smart” and …

Enhancement of automotive penetration testing with threat analyses results

J Dürrwang, J Braun, M Rumez, R Kriesten… - … International Journal of …, 2018 - sae.org
In this work, we present an approach to support penetration tests by combining safety and
security analyses to enhance automotive security testing. Our approach includes a new way …

Sara: Security automotive risk analysis method

JP Monteuuis, A Boudguiga, J Zhang… - Proceedings of the 4th …, 2018 - dl.acm.org
Connected and automated vehicles aim to improve the comfort and the safety of the driver
and passengers. To this end, car manufacturers continually improve actual standardized …