2019 IEEE 10th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2019
DOI: 10.1109/uemcon47517.2019.8993064
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Threat Model for Vehicular Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(33 citation statements)
references
References 21 publications
0
33
0
Order By: Relevance
“…• Sequence Number [1]: The data in a wireless network are transmitted as packet/frame. Each packet/frame will have a sequence number.…”
Section: Plan and Implement Cybersecurity Controlsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Sequence Number [1]: The data in a wireless network are transmitted as packet/frame. Each packet/frame will have a sequence number.…”
Section: Plan and Implement Cybersecurity Controlsmentioning
confidence: 99%
“…• Encryption [1]: Encryption provides data confidentiality by scrambling the data, and it can only be unscrambled with the knowledge of the key and the algorithm used to scramble. Encryption can be employed in two ways:…”
Section: Plan and Implement Cybersecurity Controlsmentioning
confidence: 99%
“…Five processes or components make up threat modelling, each of which is essential and functions in concert to provide a full security assessment of the system. The following are the components of threat modelling [6]:  Assets: At all times, the attacker will make an effort to get access to some of the system's assets. Before creating a security solution, it is essential to identify the system's most valuable assets and how they may attract an attacker [6].…”
Section: Threat Modelmentioning
confidence: 99%
“…The following are the components of threat modelling [6]:  Assets: At all times, the attacker will make an effort to get access to some of the system's assets. Before creating a security solution, it is essential to identify the system's most valuable assets and how they may attract an attacker [6].  Entry points: Entry points are vulnerable or suspicious points where attackers can access a system [6].…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation