[HTML][HTML] Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

AI-enabled IoT penetration testing: state-of-the-art and research challenges

C Greco, G Fortino, B Crispo… - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …

Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud

D Alharthi - International Conference on Cyber Warfare and …, 2023 - books.google.com
The state of cloud security is evolving. Many organizations are migrating their on-premises
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …

Necessity of automated vulnerability assessment in healthcare with the emergence of 5G

M Khushal, W Asif - 2021 IEEE International Smart Cities …, 2021 - ieeexplore.ieee.org
The need for having automated vulnerability assessment in the healthcare industry is
imperative under the development towards 5G communication. The development of 5G has …

Exploration of the attacking web vectors

T Osmëni, M Ali - 2021 International Conference on Computing …, 2021 - ieeexplore.ieee.org
Most people in the industrial world use a wide variety of web applications daily with the
majority being insecure and vulnerable. This gives hackers the opportunity to steal data from …

Towards new challenges of modern Pentest

DD Bertoglio, A Gil, J Acosta, J Godoy… - … conference on WorldS4, 2023 - Springer
With the increasing number of Internet-based resources and applications, the amount of
attacks faced by companies has increased significantly in the past years. Likewise, the …

A Systematic Survey on Cloud Security Threats, Impacts and Remediation

D Ahir, N Shaikh - 2023 IEEE Engineering Informatics, 2023 - ieeexplore.ieee.org
Cloud computing has quickly become successful and popular because of the benefits
provided like flexibility, cost effectiveness, and ease of deployment. Along with benefits …

A method of vulnerability assessment based on deep learning and OSS fault big data

Y Tamura, H Sone, A Anand… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Software vulnerability is generally defined as the weakness of security caused by the fault.
Waterfall model has been usually used for the software development till recent past. Also, a …

Investigation of Cloud Computing Security Issues & Challenges

A Sharma, UK Singh - 3rd International Conference on …, 2021 - atlantis-press.com
The Trends of using cloud computing in IT industries is increasing since the Inception of this
innovative technology. This new shift in the industrial technology, which will grow and …

Méthodes formelles et techniques de validation pour garantir la sécurité des systèmes automobiles

M Krichen - 2024 - hal.science
La complexité croissante et la connectivité des systèmes automobiles suscitent des
inquiétudes quant à leur vulnérabilité aux atteintes à la sécurité. Par conséquent …