A systematic threat analysis and defense strategies for the metaverse and extended reality systems

S Qamar, Z Anwar, M Afzal - Computers & Security, 2023 - Elsevier
With the rapid development and evolution of immersive technologies there are growing
concerns of security and privacy threats to the metaverse and extended reality (XR) systems …

[HTML][HTML] An overview of safety and security analysis frameworks for the internet of things

A Abdulhamid, S Kabir, I Ghafir, C Lei - Electronics, 2023 - mdpi.com
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …

[HTML][HTML] Systematic analysis of automated threat modelling techniques: Comparison of open-source tools

D Granata, M Rak - Software Quality Journal, 2024 - Springer
Companies face increasing pressure to protect themselves and their customers from security
threats. Security by design is a proactive approach that builds security into all aspects of a …

Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective

N Azam, L Michala, S Ansari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …

Dependability of the internet of things: Current status and challenges

A Abdulhamid, S Kabir, I Ghafir… - … Conference on Electrical …, 2022 - ieeexplore.ieee.org
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …

The internet of modular robotic things: Issues, limitations, challenges, & solutions

JPA Yaacoub, HN Noura, B Piranda - Internet of Things, 2023 - Elsevier
The world is becoming more digitized with the rise of modular robotic systems. Therefore,
with the increasing demands and needs for robotics, the modular robotic domain was …

A Testing and Verification Approach to Tune Control Parameters of Cooperative Driving Automation Under False Data Injection Attacks

JC Holland, F Javidi-Niroumand, A Ala'J… - IEEE …, 2024 - ieeexplore.ieee.org
Control systems are used in safety-critical applications where tuning the system parameters
is required to ensure safe and secure operation. The process of tuning these parameters …

[HTML][HTML] A Framework for Synthetic Agetech Attack Data Generation

N Khaemba, I Traoré, M Mamun - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
To address the lack of datasets for agetech, this paper presents an approach for generating
synthetic datasets that include traces of benign and attack datasets for agetech. The …

[PDF][PDF] An Overview of Safety and Security Analysis Frameworks for the Internet of Things. Electronics 2023, 12, 3086

A Abdulhamid, S Kabir, I Ghafir, C Lei - 2023 - researchgate.net
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …

Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things

ML Godakanda - 2023 - ro.ecu.edu.au
Modern technology has proliferated into just about every aspect of life while improving the
quality of life. For instance, IoT technology has significantly improved over traditional …