{"id":"https://openalex.org/W2909630727","doi":"https://doi.org/10.5220/0007412104790486","title":"Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook","display_name":"Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2909630727","doi":"https://doi.org/10.5220/0007412104790486","mag":"2909630727"},"language":"en","primary_location":{"id":"doi:10.5220/0007412104790486","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007412104790486","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007412104790486","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070311011","display_name":"Wenjun Xiong","orcid":"https://orcid.org/0000-0003-0434-4436"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Wenjun Xiong","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025700011","display_name":"Fredrik Krantz","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Fredrik Krantz","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038692098","display_name":"Robert Lagerstr\u00f6m","orcid":"https://orcid.org/0000-0003-3089-3885"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Robert Lagerstr\u00f6m","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm and Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070311011"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.55,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8290404,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"479","last_page":"486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7386893033981323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7113784551620483},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.6226948499679565},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5357254147529602},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5168648362159729},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.456399142742157},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.43596014380455017},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.41804784536361694},{"id":"https://openalex.org/keywords/metamodeling","display_name":"Metamodeling","score":0.41159188747406006},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19526344537734985},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10622119903564453},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07888484001159668}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7386893033981323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7113784551620483},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.6226948499679565},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5357254147529602},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5168648362159729},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.456399142742157},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.43596014380455017},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.41804784536361694},{"id":"https://openalex.org/C86610423","wikidata":"https://www.wikidata.org/wiki/Q1925081","display_name":"Metamodeling","level":2,"score":0.41159188747406006},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19526344537734985},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10622119903564453},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07888484001159668},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0007412104790486","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007412104790486","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0007412104790486","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007412104790486","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387995186","https://openalex.org/W2897971651","https://openalex.org/W3155916161","https://openalex.org/W4320024171","https://openalex.org/W3036725378","https://openalex.org/W4388867306","https://openalex.org/W4297337468","https://openalex.org/W2502907510","https://openalex.org/W3098149751","https://openalex.org/W4320442588"],"abstract_inverted_index":{"Modern":[0],"vehicles":[1,159],"are":[2,7,139],"dependent":[3],"on":[4,129],"software,":[5],"and":[6,43,73,80,94,117,160,182,194],"often":[8],"connected":[9,135,158],"to":[10,21,39,56,75,188],"the":[11,58,105,115,154,171,203],"Internet":[12,28],"or":[13],"other":[14,90],"external":[15],"services,":[16],"which":[17,130],"makes":[18],"them":[19],"vulnerable":[20],"various":[22],"attacks.":[23],"To":[24],"improve":[25],"security":[26,68,78],"for":[27,45,134,202],"facing":[29],"systems,":[30],"holistic":[31],"threat":[32,59,121,161],"modeling":[33,162],"is":[34,55,173,184,200],"becoming":[35],"a":[36,119,124,196],"common":[37],"way":[38],"proactively":[40],"make":[41],"decisions":[42],"design":[44],"security.":[46],"One":[47],"approach":[48,172],"that":[49,170],"has":[50,85,98,150],"not":[51,147],"been":[52,86,101,151],"commonly":[53],"implemented":[54],"enhance":[57],"models":[60],"with":[61,163],"probabilistic":[62],"attack":[63,70,137,164],"simulations.":[64],"That":[65],"is,":[66],"incorporating":[67],"intelligence,":[69],"types,":[71],"vulnerabilities,":[72],"countermeasures":[74,183],"get":[76],"objective":[77],"metrics":[79],"risk":[81],"assessments.":[82],"This":[83,108],"combination":[84],"shown":[87],"efficient":[88],"in":[89,104,114,153,178,186],"disciplines,":[91],"e.g.":[92],"energy":[93],"banking.":[95],"However,":[96],"it":[97],"so":[99],"far":[100],"fairly":[102],"unexplored":[103],"vehicle":[106,120,136,179,204],"domain.":[107,205],"position":[109],"paper":[110],"reviews":[111],"previous":[112],"research":[113,132,177],"field,":[116],"implements":[118],"model":[122],"using":[123],"tool":[125],"called":[126],"securiCAD,":[127],"based":[128],"future":[131],"requirements":[133],"simulations":[138],"also":[140],"derived.":[141],"The":[142],"main":[143],"findings":[144],"are:":[145],"1)":[146],"much":[148],"work":[149],"done":[152],"combined":[155],"area":[156],"of":[157],"simulations,":[165],"2)":[166],"initial":[167],"tests":[168],"show":[169],"useful,":[174],"3)":[175],"more":[176,190,197],"specific":[180],"attacks":[181],"needed":[185,201],"order":[187],"provide":[189],"accurate":[191],"simulation":[192],"results,":[193],"4)":[195],"tailored":[198],"metamodel":[199]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
