2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162227
|View full text |Cite
|
Sign up to set email alerts
|

A Security Reference Model for Autonomous Vehicles in Military Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Thus, the value assigned to the assets as discussed in the previous section, can be directly used to inform the risk process at system level. As for the threat and vulnerability components of risk, they are not in the scope of the paper, but we use a threat assessment model developed specifically for unmanned and autonomous military vehicles Mancini et al (2021); Mancini, F. et al (2023) to support the case study in Section 5. For other types of ICT systems there exist other models and threat catalogs that can be used.…”
Section: Risk and Securitymentioning
confidence: 99%
“…Thus, the value assigned to the assets as discussed in the previous section, can be directly used to inform the risk process at system level. As for the threat and vulnerability components of risk, they are not in the scope of the paper, but we use a threat assessment model developed specifically for unmanned and autonomous military vehicles Mancini et al (2021); Mancini, F. et al (2023) to support the case study in Section 5. For other types of ICT systems there exist other models and threat catalogs that can be used.…”
Section: Risk and Securitymentioning
confidence: 99%
“…Research such as [33][34][35][36][37] has paid great attention to influence and acceptance factors. In contrast, [8,[38][39][40][41][42][43][44][45][46] have focused on cybersecurity challenges and evaluations. Drawing parallelism from cybersecurity, risk assessment, security management techniques, security impacts and effects, and threat analysis has been beneficial for quantifying security.…”
Section: Two-factor Authentication (2fmentioning
confidence: 99%
“…Most of Tor's tasks involve collecting, processing, storing and communicating data. In this sense, it is exposed to many of the same threats found in well-established catalogues 2 . The main difference from a pure information system, is that these tasks are performed while navigating through a demanding environment.…”
Section: A Catalogue Of Threats and Attacksmentioning
confidence: 99%
“…Recent studies provide a first overview of relevant threats and necessary security capabilities [1], [2], among which is the ability to autonomously detect attacks or malfunctions and react in a way that minimises the consequences for the mission: a fully autonomous cyber defence capability. The reason is that advanced autonomous vehicles will likely be employed in missions where it is not possible to remote control or monitor the system for extended periods of times, and potential compromises must be handled locally and autonomously.…”
Section: Introductionmentioning
confidence: 99%