All Stories

  1. Actors for Timing Analysis of Distributed Redundant Controllers
  2. Learning single and compound-protocol automata and checking behavioral equivalences
  3. Black-Box Protocol Testing Using Rebeca and Automata Learning
  4. AVATAR: Autonomous Vehicle Assessment through Testing of Adversarial Patches in Real-time
  5. Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents
  6. Approaches for Automating Cybersecurity Testing of Connected Vehicles
  7. AVATAR: Autonomous Vehicle Assessment through Testing of Adversarial Patches in Real-time
  8. From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling
  9. Using Automata Learning for Compliance Evaluation of Communication Protocols on an NFC Handshake Example
  10. A Global Survey of Standardization and Industry Practices of Automotive Cybersecurity Validation and Verification Testing Processes and Tools
  11. A Systematic Approach to Automotive Security
  12. Zeroth-Order Optimization Attacks on Deep Reinforcement Learning-Based Lane Changing Algorithms for Autonomous Vehicles
  13. Wireless Security in Vehicular Ad Hoc Networks: A Survey
  14. A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation
  15. Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing
  16. An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case
  17. SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems
  18. Structured Vehicle Cybersecurity Testing
  19. Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach
  20. Steering Drivers of Change: Maximising Benefits of Trustworthy IoT
  21. Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques
  22. Threat Modeling in the Smart Grid
  23. Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
  24. Decentralized Energy Networks Based on Blockchain: Background, Overview and Concept Discussion
  25. Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing
  26. Approaching the Automation of Cyber Security Testing of Connected Vehicles
  27. Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers
  28. Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective
  29. An overview of wireless IoT protocol security in the smart home domain
  30. Towards a secure smart grid storage communications gateway
  31. An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks