A survey of vehicle to everything (V2X) testing

J Wang, Y Shao, Y Ge, R Yu - Sensors, 2019 - mdpi.com
Vehicle to everything (V2X) is a new generation of information and communication
technologies that connect vehicles to everything. It not only creates a more comfortable and …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

[图书][B] The cybersecurity dilemma: Hacking, trust, and fear between nations

B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

A novel security model for cooperative virtual networks in the IoT era

SA Alabady, F Al-Turjman, S Din - International Journal of Parallel …, 2020 - Springer
Abstract The Internet of Things (IoT) has particular applications in public safety as well as
other domains such as smart cities, health monitoring, smart homes and environments …

Overview and open issues on penetration test

D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
Several studies regarding security testing for corporate environments, networks, and
systems were developed in the past years. Therefore, to understand how methodologies …

CAD: command-level anomaly detection for vehicle-road collaborative charging network

Q Li, S Meng, S Wang, J Zhang, J Hou - IEEE Access, 2019 - ieeexplore.ieee.org
A large number of charging piles installed on roadside parking spaces and smart poles on
the roadside of the Internet have become essential substation infrastructure (roadside) for …

Systems and methods for detecting computer vulnerabilities that are triggered by events

B Gorodissky, A Ashkenazy, R Segal - US Patent 10,686,823, 2020 - Google Patents
US10686823B2 - Systems and methods for detecting computer vulnerabilities that are
triggered by events - Google Patents US10686823B2 - Systems and methods for detecting …

[HTML][HTML] The simulated security assessment ecosystem: Does penetration testing need standardisation?

W Knowles, A Baron, T McGarr - Computers & Security, 2016 - Elsevier
Simulated security assessments (a collective term used here for penetration testing,
vulnerability assessment, and related nomenclature) may need standardisation, but not in …

Automatic generation algorithm of penetration graph in penetration testing

X Qiu, Q Jia, S Wang, C Xia, L Lv - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
Penetration graph is a kind of attack graph which is widely used in penetration testing. It is
an import tool to analyze security vulnerabilities in the network. However, the previous …