[HTML][HTML] Towards an integrated swarm intelligence framework for urban mobility: A systematic review and proposed theoretical model

DER de Gauna, LE Sánchez, A Ruiz-Iniesta… - Journal of King Saud …, 2023 - Elsevier
In recent years, autonomous electric vehicles (A-EVs) have attracted the attention of
academia and industry. In urban mobility, this topology requires consensus to control …

[PDF][PDF] Design technique for secure embedded devices: Application for creation of integrated cyber-physical security system.

V Desnitsky, D Levshun, A Chechulin… - J. Wirel. Mob. Networks …, 2016 - isyou.info
As elements of complex information systems, embedded devices define informational and
physical connections between the level of software control of the system on the one hand …

Towards blockchain-based multi-agent robotic systems: Analysis, classification and applications

I Afanasyev, A Kolotov, R Rezin, K Danilov… - arXiv preprint arXiv …, 2019 - arxiv.org
Decentralization, immutability and transparency make of Blockchain one of the most
innovative technology of recent years. This paper presents an overview of solutions based …

Design of secure microcontroller-based systems: application to mobile robots for perimeter monitoring

D Levshun, A Chechulin, I Kotenko - Sensors, 2021 - mdpi.com
This paper describes an original methodology for the design of microcontroller-based
physical security systems and its application for the system of mobile robots. The novelty of …

Design lifecycle for secure cyber-physical systems based on embedded devices

D Levshun, A Chechulin… - 2017 9th IEEE International …, 2017 - ieeexplore.ieee.org
The paper is devoted to the issues of design of secure cyber-physical systems based on
embedded devices. It aims to develop a generalized approach to the design of secure …

Security event analysis in XBee-based wireless mesh networks

VA Desnitsky, IV Kotenko - 2018 IEEE Conference of Russian …, 2018 - ieeexplore.ieee.org
In modern cyber-physical systems and wireless sensor networks the complexity of crisis
management processes is caused by a variety of software/hardware assets and …

Жизненный цикл разработки защищенных систем на основе встроенных устройств

ДС Левшун, АА Чечулин, ИВ Котенко - Защита информации. Инсайд, 2017 - elibrary.ru
Статья посвящена вопросам проектирования защищенных киберфизических систем на
основе встроенных устройств (ВУ). Проанализированы современные подходы к …

The integrated model of secure cyber-physical systems for their design and verification

D Levshun, I Kotenko, A Chechulin - Intelligent Distributed Computing XIII, 2020 - Springer
This paper considers a new integrated model of secure cyber-physical systems for their
design and verification. The suggested integrated model represents cyber-physical systems …

Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks

D Levshun - 2021 - theses.hal.science
One of the possible ways to ensure the security of microcontroller-based systems is the
implementation of security by design approach. Unfortunately, existing approaches are not …

Event analysis for security incident management on a perimeter access control system

VA Desnitsky, IV Kotenko - 2016 XIX IEEE International …, 2016 - ieeexplore.ieee.org
The paper comprises issues of security incident analysis and management in Internet of
Things. A general approach to security event analysis on the base of proactivity, dynamism …