Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops

Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops

Author: Jérémie Guiochet

Publisher: Springer Nature

Published: 2023-10-15

Total Pages: 448

ISBN-13: 3031409531

DOWNLOAD EBOOK

This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2023, held in Toulouse, France, during September 19, 2023. The 35 full papers included in this volume were carefully reviewed and selected from 49 submissions. - - 8th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2023) - - 18th International Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems (DECSoS 2023) - - 10th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2023) - - Second International Workshop on Security and Safety Interactions (SENSEI 2023) - - First International Workshop on Safety/ Reliability/ Trustworthiness of Intelligent Transportation Systems (SRToITS 2023) - - 6th International Workshop on Artificial Intelligence Safety Engineering (WAISE 2023)


Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

Author: Qadeer Ahmed

Publisher: SAE International

Published: 2024-04-22

Total Pages: 32

ISBN-13: 1468608150

DOWNLOAD EBOOK

Given the rapid advancements in engineering and technology, it is anticipated that connected and automated vehicles (CAVs) will soon become prominent in our daily lives. This development has a vast potential to change the socio-technical perception of public, personal, and freight transportation. The potential benefits to society include reduced driving risks due to human errors, increased mobility, and overall productivity of autonomous vehicle consumers. On the other hand, the potential risks associated with CAV deployment related to technical vulnerabilities are safety and cybersecurity issues that may arise from flawed hardware and software. Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. This report also highlights the importance of establishing robust cybersecurity protocols and fostering digital trust in these vehicles to ensure safe and secure deployment in our modern transportation system. Click here to access The Mobility Frontier: Cybersecurity and Trust Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2024009


Utilizing Generative AI for Cyber Defense Strategies

Utilizing Generative AI for Cyber Defense Strategies

Author: Jhanjhi, Noor Zaman

Publisher: IGI Global

Published: 2024-09-12

Total Pages: 546

ISBN-13:

DOWNLOAD EBOOK

As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, and ensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation are presented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computer engineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers.