[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review
V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …
interpreted in many different but equally viable ways. However, this makes the topic appear …
Cybersecurity on Connected and Automated Transportation Systems: A Survey
Connected and automated vehicles (CAVs) provide various valuable and advanced
services to manufacturers, owners, mobility service providers, and transportation authorities …
services to manufacturers, owners, mobility service providers, and transportation authorities …
Autonomous vehicle platoon packet based control problem under Denial-of-Service attacks
The present work tackles the H∞ Packet-based control design in the autonomous vehicle
platoon (AVP) problem based on digital redesign of a linear parameter-varying system …
platoon (AVP) problem based on digital redesign of a linear parameter-varying system …
Game theoretic strategies for an unmanned aerial vehicle network host under DDoS attack
Game theory involves the mathematical modeling of the strategic interaction between
rational entities. One such example is the interaction between a hacker and the defense …
rational entities. One such example is the interaction between a hacker and the defense …
Distributed neural network based architecture for DDOS detection in vehicular communication systems
N Jaton - 2021 - digitalcommons.unl.edu
With the continued development of modern vehicular communication systems, there is an
ever growing need for cutting edge security in these systems. A misbehavior detection …
ever growing need for cutting edge security in these systems. A misbehavior detection …
Machine learning-based architecture for DDoS detection in VANETs system
N Alkadiri, M Ilyas - … on Artificial Intelligence of Things (ICAIoT), 2022 - ieeexplore.ieee.org
With the fast and huge vehicular communication systems currently being developed, there is
a clear and urgent need for advanced security. To determine whether a vehicle has been …
a clear and urgent need for advanced security. To determine whether a vehicle has been …
Secure Communication for Connected Vehicles Safety Applications
Connected vehicles safety applications are in-vehicle applications aim to improve road
safety by assisting, complementing or enhancing driver's alertness and decision making …
safety by assisting, complementing or enhancing driver's alertness and decision making …
Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networks
M Stepzinski, S Sengupta - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
As smart vehicles become more common, vehicular networks are used to allow cooperation
between them. Dedicated Short-Range Communications (DSRC) is a common protocol …
between them. Dedicated Short-Range Communications (DSRC) is a common protocol …
[PDF][PDF] Cooperative and Decentralized Defense in Autonomous Vehicle Networks
A Anwar - 2023 - qspace.library.queensu.ca
In the era of the transportation revolution, the emergence of Autonomous Vehicle Networks
(AVNs) represents a remarkable feat of technological sophistication. It embodies a …
(AVNs) represents a remarkable feat of technological sophistication. It embodies a …
Improving vanets system security against DDOS attacks by using machine-learning algorithm
NMY Alkadiri - 2023 - openaccess.altinbas.edu.tr
With the fast and huge vehicular communication systems currently being developed, there is
a clear and urgent need for advanced security to determine whether a vehicle has been …
a clear and urgent need for advanced security to determine whether a vehicle has been …