Prospects and challenges of Metaverse application in data‐driven intelligent transportation systems

JN Njoku, CI Nwakanma, GC Amaizu… - IET Intelligent Transport …, 2023 - Wiley Online Library
The Metaverse is a concept used to refer to a virtual world that exists in parallel to the
physical world. It has grown from a conceptual level to having real applications in virtual …

Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

An optimized AdaBoost Multi-class support vector machine for driver behavior monitoring in the advanced driver assistance systems

R Sethuraman, S Sellappan, J Shunmugiah… - Expert Systems with …, 2023 - Elsevier
Abstract Advanced Driver Assistance System (ADAS) is a Cyber-Physical System (CPS)
application mainly developed for human–machine interaction. We employ the CPS …

Cybersecurity testing for automotive domain: A survey

F Luo, X Zhang, Z Yang, Y Jiang, J Wang, M Wu… - Sensors, 2022 - mdpi.com
Modern vehicles are more complex and interconnected than ever before, which also means
that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not …

Systematic meets unintended: Prior knowledge adaptive 5g vulnerability detection via multi-fuzzing

J Yang, Y Wang, Y Pan, TX Tran - arXiv preprint arXiv:2305.08039, 2023 - arxiv.org
The virtualization and softwarization of 5G and NextG are critical enablers of the shift to
flexibility, but they also present a potential attack surface for threats. However, current …

Design and Implementation of Digital Twin‐Assisted Simulation Method for Autonomous Vehicle in Car‐Following Scenario

H Xiong, Z Wang, G Wu, Y Pan - Journal of Sensors, 2022 - Wiley Online Library
The automated system replaces the driver, which makes autonomous vehicle to improve
safety and convenience, so the market of autonomous vehicle is huge. However, the real …

Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond

J Yang, S Arya, Y Wang - IEEE Access, 2024 - ieeexplore.ieee.org
Softwarization and virtualization in 5G and beyond necessitate thorough testing to ensure
the security of critical infrastructure and networks. This involves identifying vulnerabilities …

Coverage-guided fuzz testing for cyber-physical systems

S Sheikhi, E Kim, PS Duggirala… - 2022 ACM/IEEE 13th …, 2022 - ieeexplore.ieee.org
Fuzz testing is an indispensable test-generation tool in software security. Fuzz testing uses
automated directed randomness to explore a variety of execution paths in software, trying to …

Symbiotic Analysis of Security Assessment and Penetration Tests Guiding Real L4 Automated City Shuttles

M Benyahya, P Bergerat, A Collen, NA Nijdam - Telecom, 2023 - mdpi.com
The Connected Automated Vehicle (CAV)'s deployment is proof of the wide evolution of
autonomous driving technologies enabling vehicles to gradually dispose of their drivers …

Reliability and Security Analysis of Artificial Intelligence‐Based Self‐Driving Technologies in Saudi Arabia: A Case Study of Openpilot

FS Alsubaei - Journal of advanced transportation, 2022 - Wiley Online Library
Saudi Arabia has an ambitious vision that embraces artificial intelligence (AI) technologies
at a mass scale in new cities such as Neom. Self‐driving has recently become one of the …