Anhtuan Le
YOU?
Author Swipe
View article: Minimum Requirements for Space System Cybersecurity - Ensuring Cyber Access to Space
Minimum Requirements for Space System Cybersecurity - Ensuring Cyber Access to Space Open
Space systems are continuously under cyber attack. Minimum cybersecurity design requirements are necessary to preserve our access to space. This paper proposes a scalable, extensible method for developing minimum cyber design principles an…
View article: A comparative cyber risk analysis between federated and self-sovereign identity management systems
A comparative cyber risk analysis between federated and self-sovereign identity management systems Open
Self-sovereign identity (SSI) is an emerging and promising concept that enables users to control their identity while enhancing security and privacy compared to other identity management (IDM) approaches. Despite the recent advancements in…
View article: A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis Open
Connected autonomous vehicles (CAVs) will be deployed over the next decade with autonomous functionalities supported by new sensing and communication capabilities. Such functionality exposes CAVs to new attacks that current vehicles will n…
View article: Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats
Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats Open
In today’s cyber world, assessing security threats before implementing smart grids is essential to identify and mitigate the
\nrisks. Loss Event Frequency (LEF) is a concept provided by the well-known Factor Analysis of Information Risk (F…
View article: Managing risks in the fisheries supply chain using House of Risk Framework (HOR) and Interpretive Structural Modeling (ISM)
Managing risks in the fisheries supply chain using House of Risk Framework (HOR) and Interpretive Structural Modeling (ISM) Open
One of the sectors which contributes importantly to the development of Vietnam economy is fishery industry. However, during recent year, it has been witnessed many difficulties on managing the performance of the fishery supply chain operat…
View article: Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research
Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research Open
Recent years have seen a number of cyber attacks targeting Industrial Control Systems (ICSs). Reports detailing the findings from such attacks vary in detail. Hands-on experimental research is, therefore, required to better understand and …
View article: A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology Open
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a…