Emerging transportation technologies, including electric vehicles (EVs), autonomous vehicles (AVs), and connected vehicles (CVs), are poised to revolutionize mobility and logistics through advancements in connectivity...
详细信息
Emerging transportation technologies, including electric vehicles (EVs), autonomous vehicles (AVs), and connected vehicles (CVs), are poised to revolutionize mobility and logistics through advancements in connectivity, automation, and electrification. However, the convergence of these systems introduces substantial cybersecurity challenges, including data breaches, spoofing, and infrastructure attacks, due to increasingly complex and interconnected attack surfaces. This paper presents a comprehensive survey of cybersecurity threats, vulnerabilities, and evaluation practices within the AV, CV, and EV landscape. We analyze 227 peer-reviewed studies published between 2021 and 2025 and introduce two novel taxonomies: a three-stage cyber-attack lifecycle framework—Stream to information (S2I), information to Decision (I2D), and Decision to Actuation (D2A)—and eleven representative attack paths. Our findings reveal that the stream and data processing stages are most frequently exploited, with limited standardization in evaluation metrics and inadequate emphasis on real-world operational consequences. We highlight the growing importance of integrating quantum-safe cryptography and AI-driven anomaly detection as proactive defense mechanisms. Finally, we offer stage-wise design recommendations and identify future research directions, including the need for cross-domain evaluation frameworks, cyber-social risk assessments, and secure integration of emerging multi-modal systems. This survey aims to support policymakers, researchers, and industry stakeholders in developing resilient, secure, and trustworthy next-generation road transportation ecosystems.
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues f...
详细信息
ISBN:
(数字)9783540377528
ISBN:
(纸本)9783540377504
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
This book features high-quality research papers presented at the 4th International Conference on Advanced computing and Intelligent engineering (ICACIE 2019), department of computerscience, Rama Devi Women’s Univers...
详细信息
ISBN:
(数字)9789811565847
ISBN:
(纸本)9789811565830
This book features high-quality research papers presented at the 4th International Conference on Advanced computing and Intelligent engineering (ICACIE 2019), department of computerscience, Rama Devi Women’s University, Bhubaneswar, Odisha, India. It includes sections describing technical advances and contemporary research in the fields of advanced computing and intelligent engineering, which are based on the presented articles. Intended for postgraduate students and researchers working in the discipline of computerscience and engineering, the book also appeals to researchers in the domain of electronics as it covers hardware technologies and future communication technologies.
Most contemporary work on magnetic tunnel junctions either consider ballistic quantum transport across the tunneling barrer, for instance via the Non Equilibrium Green's Function (NEGF) formalism, or treat the tun...
详细信息
This book features selected papers from the 6th International Conference on Mathematics and computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advanc...
详细信息
ISBN:
(数字)9789811580611
ISBN:
(纸本)9789811580604
This book features selected papers from the 6th International Conference on Mathematics and computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the department of information Technology, Vasavi Co...
详细信息
ISBN:
(数字)9789811933912
ISBN:
(纸本)9789811933905
The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the department of information Technology, Vasavi College of engineering, Hyderabad, India in January 2022. ICCIDA provides an excellent platform for exchanging knowledge with the global community of scientists, engineers, and educators. This volume covers cutting-edge research in two prominent areas – computational intelligence and data analytics, and allied research areas.
暂无评论