Search Results - "Collen, Anastasija"
-
1
Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity
Published in Sensors (Basel, Switzerland) (21-04-2023)“…Internet of Things (IoT) faces security concerns different from existing challenges in conventional information systems connected through the Internet because…”
Get full text
Journal Article -
2
Analyses on standards and regulations for connected and automated vehicles: Identifying the certifications roadmap
Published in Transportation engineering (Oxford) (01-12-2023)“…•Mapping key standards to the layers of the automated vehicles of level four and five.•Connected and automated vehicles cybersecurity and data privacy audit…”
Get full text
Journal Article -
3
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
Published in Symmetry (Basel) (01-06-2019)“…The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including…”
Get full text
Journal Article -
4
The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis
Published in Applied sciences (01-05-2022)“…The fast evolution and prevalence of driverless technologies has facilitated the testing and deployment of automated city shuttles (ACSs) as a means of public…”
Get full text
Journal Article -
5
Symbiotic Analysis of Security Assessment and Penetration Tests Guiding Real L4 Automated City Shuttles
Published in Telecom (Basel) (01-03-2023)“…The Connected Automated Vehicle (CAV)’s deployment is proof of the wide evolution of autonomous driving technologies enabling vehicles to gradually dispose of…”
Get full text
Journal Article -
6
Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review
Published in IEEE access (2023)“…Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc Distributed Wireless Networks (DWNs) to stimulate and improve cooperation…”
Get full text
Journal Article -
7
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment
Published in Information (Basel) (01-07-2022)“…Modern technology and the digitisation era accelerated the pace of data generation and collection for various purposes. The orchestration of such data is a…”
Get full text
Journal Article -
8
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments
Published in Computers & security (01-11-2022)“…The Automated City Shuttles (ACSs) aim to shape the future public transportation and provide more efficient and accessible mobility in smart cities. With the…”
Get full text
Journal Article -
9
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module
Published in 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01-07-2023)“…Security hardware modules were designed to provide a viable solution that can empower Embedded Systems (ES) with state-of-the-art cryptographic and security…”
Get full text
Conference Proceeding -
10
Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust
Published in 2018 Innovations in Intelligent Systems and Applications (INISTA) (01-07-2018)“…The H2020 European research project Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control (GHOST) aims to develop a cyber-security layer…”
Get full text
Conference Proceeding -
11
Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts
Published in 2018 Innovations in Intelligent Systems and Applications (INISTA) (01-07-2018)“…The European research project GHOST challenges the traditional cyber security solutions for the Internet of Things (IoT) sector by exploiting novel…”
Get full text
Conference Proceeding