- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0012000000000000
- More
- Availability
-
21
- Author / Contributor
- Filter by Author / Creator
-
-
Xie, Mengjun (2)
-
Hector Suarez, Hooper Kincannon (1)
-
Mohamed, Ahmed (1)
-
Zhang, Ruipeng (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
& Arnett, N. (0)
-
& Arya, G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Vehicular Ad-hoc Networks (VANETs) are a crucial component of Cooperative Intelligent Transportation Systems (C-ITS), enabling vehicles to communicate and share vital information to enhance road safety and efficiency. Basic Safety Messages (BSMs), periodically broadcast by vehicles to provide real-time kinematic data, form the foundation of numerous safety applications within VANETs. Ensuring the security of BSMs is paramount, as malicious entities can exploit vulnerabilities to launch attacks that could have catastrophic consequences. In this study, we provide a comprehensive analysis of BSM attacks and detection mechanisms in VANETs. We begin by outlining the system model, security requirements, and attacker models relevant to BSMs. Then, we categorize and describe a range of attacks, from simple position falsification to more sophisticated and evasive techniques, such as the SixPack attack. We also classify existing attack detection methods into machine learning-based, deep learning-based, plausibility and consistency-based, and software-defined networking (SDN)-based mechanisms, analyzing their effectiveness and limitations. Additionally, we highlight the challenges in securing BSMs, such as the trade-off between model accuracy and real-time performance. Future research directions are also discussed. This survey paper serves as a foundational step towards building safe, secure, and reliable cooperative intelligent transportation systems and their associated applications.more » « lessFree, publicly-accessible full text available May 25, 2026
-
Zhang, Ruipeng; Xie, Mengjun (, Proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime)
-
Hector Suarez, Hooper Kincannon (, PROCEEDINGS ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE)Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities in secure web developments including SQL injection, broken authentication and session management, cross site scripting, insecure direct object references, etc. In this paper, each module is self-contained with a module background, sample module questions, and the expected learning outcomes of each module.more » « less
An official website of the United States government

Full Text Available