A systematic threat analysis and defense strategies for the metaverse and extended reality systems
With the rapid development and evolution of immersive technologies there are growing
concerns of security and privacy threats to the metaverse and extended reality (XR) systems …
concerns of security and privacy threats to the metaverse and extended reality (XR) systems …
[HTML][HTML] An overview of safety and security analysis frameworks for the internet of things
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …
benefits, including many security and safety-critical applications. However, unlocking the full …
[HTML][HTML] Systematic analysis of automated threat modelling techniques: Comparison of open-source tools
Companies face increasing pressure to protect themselves and their customers from security
threats. Security by design is a proactive approach that builds security into all aspects of a …
threats. Security by design is a proactive approach that builds security into all aspects of a …
Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …
life including smart homes, smart cities, healthcare services, and autonomous systems …
Dependability of the internet of things: Current status and challenges
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …
of modern societies by making physical things around us more interconnected and remotely …
The internet of modular robotic things: Issues, limitations, challenges, & solutions
The world is becoming more digitized with the rise of modular robotic systems. Therefore,
with the increasing demands and needs for robotics, the modular robotic domain was …
with the increasing demands and needs for robotics, the modular robotic domain was …
A Testing and Verification Approach to Tune Control Parameters of Cooperative Driving Automation Under False Data Injection Attacks
JC Holland, F Javidi-Niroumand, A Ala'J… - IEEE …, 2024 - ieeexplore.ieee.org
Control systems are used in safety-critical applications where tuning the system parameters
is required to ensure safe and secure operation. The process of tuning these parameters …
is required to ensure safe and secure operation. The process of tuning these parameters …
[HTML][HTML] A Framework for Synthetic Agetech Attack Data Generation
To address the lack of datasets for agetech, this paper presents an approach for generating
synthetic datasets that include traces of benign and attack datasets for agetech. The …
synthetic datasets that include traces of benign and attack datasets for agetech. The …
[PDF][PDF] An Overview of Safety and Security Analysis Frameworks for the Internet of Things. Electronics 2023, 12, 3086
A Abdulhamid, S Kabir, I Ghafir, C Lei - 2023 - researchgate.net
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …
benefits, including many security and safety-critical applications. However, unlocking the full …
Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things
ML Godakanda - 2023 - ro.ecu.edu.au
Modern technology has proliferated into just about every aspect of life while improving the
quality of life. For instance, IoT technology has significantly improved over traditional …
quality of life. For instance, IoT technology has significantly improved over traditional …