A data-driven method for falsified vehicle trajectory identification by anomaly detection

SE Huang, Y Feng, HX Liu - Transportation research part C: emerging …, 2021 - Elsevier
The vehicle-to-infrastructure (V2I) communications enable a wide range of new applications,
which bring prominent benefits to the transportation system. However, malicious attackers …

Cybersecurity on connected and automated transportation systems: A survey

A Abdo, H Chen, X Zhao, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Connected and automated vehicles (CAVs) provide various valuable and advanced
services to manufacturers, owners, mobility service providers, and transportation authorities …

Risk Management and Cybersecurity in Transportation and Warehousing

A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …

[PDF][PDF] Evaluations of cyber attacks on cooperative control of connected and autonomous vehicles at bottleneck points

HM Ahmad, E Sabouni, W Xiao… - … on Vehicles Security …, 2023 - par.nsf.gov
In this paper we analyze the effect of cyberattacks on cooperative control of connected and
autonomous vehicles (CAVs) at traffic bottleneck points. We focus on three types of such …

Trust-aware resilient control and coordination of connected and automated vehicles

HMS Ahmad, E Sabouni, W Xiao… - 2023 IEEE 26th …, 2023 - ieeexplore.ieee.org
We address the security of a network of Connected and Automated Vehicles (CAVs)
cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can …

Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions

HM Ahmad, E Sabouni, A Dickson, W Xiao… - arXiv preprint arXiv …, 2024 - arxiv.org
We address the security of a network of Connected and Automated Vehicles (CAVs)
cooperating to safely navigate through a conflict area (eg, traffic intersections, merging …

Loss and premium calculation of network nodes under the spread of SIS virus

J Qi - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
In the big data and “Internet+” era, the research related cybersecurity risk has attracted much
attention. However, Premium pricing for cybersecurity insurance remains in its early days. In …