[HTML][HTML] Formal methods and validation techniques for ensuring automotive systems security
M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …
about their vulnerability to security breaches. As a result, the integration of formal methods …
AI-enabled IoT penetration testing: state-of-the-art and research challenges
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …
Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud
D Alharthi - International Conference on Cyber Warfare and …, 2023 - books.google.com
The state of cloud security is evolving. Many organizations are migrating their on-premises
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …
Necessity of automated vulnerability assessment in healthcare with the emergence of 5G
M Khushal, W Asif - 2021 IEEE International Smart Cities …, 2021 - ieeexplore.ieee.org
The need for having automated vulnerability assessment in the healthcare industry is
imperative under the development towards 5G communication. The development of 5G has …
imperative under the development towards 5G communication. The development of 5G has …
Exploration of the attacking web vectors
T Osmëni, M Ali - 2021 International Conference on Computing …, 2021 - ieeexplore.ieee.org
Most people in the industrial world use a wide variety of web applications daily with the
majority being insecure and vulnerable. This gives hackers the opportunity to steal data from …
majority being insecure and vulnerable. This gives hackers the opportunity to steal data from …
Towards new challenges of modern Pentest
DD Bertoglio, A Gil, J Acosta, J Godoy… - … conference on WorldS4, 2023 - Springer
With the increasing number of Internet-based resources and applications, the amount of
attacks faced by companies has increased significantly in the past years. Likewise, the …
attacks faced by companies has increased significantly in the past years. Likewise, the …
A Systematic Survey on Cloud Security Threats, Impacts and Remediation
D Ahir, N Shaikh - 2023 IEEE Engineering Informatics, 2023 - ieeexplore.ieee.org
Cloud computing has quickly become successful and popular because of the benefits
provided like flexibility, cost effectiveness, and ease of deployment. Along with benefits …
provided like flexibility, cost effectiveness, and ease of deployment. Along with benefits …
A method of vulnerability assessment based on deep learning and OSS fault big data
Software vulnerability is generally defined as the weakness of security caused by the fault.
Waterfall model has been usually used for the software development till recent past. Also, a …
Waterfall model has been usually used for the software development till recent past. Also, a …
Investigation of Cloud Computing Security Issues & Challenges
A Sharma, UK Singh - 3rd International Conference on …, 2021 - atlantis-press.com
The Trends of using cloud computing in IT industries is increasing since the Inception of this
innovative technology. This new shift in the industrial technology, which will grow and …
innovative technology. This new shift in the industrial technology, which will grow and …
Méthodes formelles et techniques de validation pour garantir la sécurité des systèmes automobiles
M Krichen - 2024 - hal.science
La complexité croissante et la connectivité des systèmes automobiles suscitent des
inquiétudes quant à leur vulnérabilité aux atteintes à la sécurité. Par conséquent …
inquiétudes quant à leur vulnérabilité aux atteintes à la sécurité. Par conséquent …