Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (239)

Search Parameters:
Keywords = cybersecurity standards

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1583 KB  
Article
How Does AI Transform Cyber Risk Management?
by Sander Zeijlemaker, Yaphet K. Lemiesa, Saskia Laura Schröer, Abhishta Abhishta and Michael Siegel
Systems 2025, 13(10), 835; https://doi.org/10.3390/systems13100835 - 23 Sep 2025
Viewed by 127
Abstract
Digital transformation embeds smart cities, e-health, and Industry 4.0 into critical infrastructures, thereby increasing reliance on digital systems and exposure to cyber threats and boosting complexity and dependency. Research involving over 200 executives reveals that under rising complexity, only 15% of cyber risk [...] Read more.
Digital transformation embeds smart cities, e-health, and Industry 4.0 into critical infrastructures, thereby increasing reliance on digital systems and exposure to cyber threats and boosting complexity and dependency. Research involving over 200 executives reveals that under rising complexity, only 15% of cyber risk investments are effective, leaving most organizations misaligned or vulnerable. In this context, the role of artificial intelligence (AI) in cybersecurity requires systemic scrutiny. This study analyzes how AI reshapes systemic structures in cyber risk management through a multi-method approach: literature review, expert workshops with practitioners and policymakers, and a structured kill chain analysis of the Colonial Pipeline attack. The findings reveal three new feedback loops: (1) deceptive defense structures that misdirect adversaries while protecting assets, (2) two-step success-to-success attacks that disable defenses before targeting infrastructure, and (3) autonomous proliferation when AI applications go rogue. These dynamics shift cyber risk from linear patterns to adaptive, compounding interactions. The principal conclusion is that AI both amplifies and mitigates systemic risk. The core recommendation is to institutionalize deception in security standards and address drifting AI-powered systems. Deliverables include validated systemic structures, policy options, and a foundation for creating future simulation models to support strategic cyber risk management investment. Full article
Show Figures

Figure 1

19 pages, 1820 KB  
Article
PROMPT-BART: A Named Entity Recognition Model Applied to Cyber Threat Intelligence
by Xinzhu Feng, Songheng He, Xinxin Wei, Runshi Liu, Huanzhou Yue and Xuren Wang
Appl. Sci. 2025, 15(18), 10276; https://doi.org/10.3390/app151810276 - 22 Sep 2025
Viewed by 318
Abstract
The growing sophistication of cyberattacks underscores the need for the automated extraction of machine-readable intelligence from unstructured Cyber Threat Intelligence (CTI), commonly achieved through Named Entity Recognition (NER). However, existing CTI-oriented NER research faces two major limitations: the scarcity of standardized datasets and [...] Read more.
The growing sophistication of cyberattacks underscores the need for the automated extraction of machine-readable intelligence from unstructured Cyber Threat Intelligence (CTI), commonly achieved through Named Entity Recognition (NER). However, existing CTI-oriented NER research faces two major limitations: the scarcity of standardized datasets and the lack of advanced models tailored to domain-specific entities. To address the dataset challenge, we present CTINER, the first STIX 2.1-aligned dataset, comprising 42,549 annotated entities across 13 cybersecurity-specific types. CTINER surpasses existing resources in both scale (+51.82% more annotated entities) and vocabulary coverage (+40.39%), while ensuring label consistency and rationality. To tackle the modeling challenge, we propose PROMPT-BART, a novel NER model built upon the BART generative framework and enhanced through three types of prompt designs. Experimental results show that PROMPT-BART improves F1 scores by 4.26–8.3% over conventional deep learning baselines and outperforms prompt-based baselines by 1.31%. Full article
Show Figures

Figure 1

22 pages, 3553 KB  
Article
An Extended Epistemic Framework Beyond Probability for Quantum Information Processing with Applications in Security, Artificial Intelligence, and Financial Computing
by Gerardo Iovane
Entropy 2025, 27(9), 977; https://doi.org/10.3390/e27090977 - 18 Sep 2025
Viewed by 199
Abstract
In this work, we propose a novel quantum-informed epistemic framework that extends the classical notion of probability by integrating plausibility, credibility, and possibility as distinct yet complementary measures of uncertainty. This enriched quadruple (P, Pl, Cr, Ps) enables a deeper characterization of quantum [...] Read more.
In this work, we propose a novel quantum-informed epistemic framework that extends the classical notion of probability by integrating plausibility, credibility, and possibility as distinct yet complementary measures of uncertainty. This enriched quadruple (P, Pl, Cr, Ps) enables a deeper characterization of quantum systems and decision-making processes under partial, noisy, or ambiguous information. Our formalism generalizes the Born rule within a multi-valued logic structure, linking Positive Operator-Valued Measures (POVMs) with data-driven plausibility estimators, agent-based credibility priors, and fuzzy-theoretic possibility functions. We develop a hybrid classical–quantum inference engine that computes a vectorial aggregation of the quadruples, enhancing robustness and semantic expressivity in contexts where classical probability fails to capture non-Kolmogorovian phenomena such as entanglement, contextuality, or decoherence. The approach is validated through three real-world application domains—quantum cybersecurity, quantum AI, and financial computing—where the proposed model outperforms standard probabilistic reasoning in terms of accuracy, resilience to noise, interpretability, and decision stability. Comparative analysis against QBism, Dempster–Shafer, and fuzzy quantum logic further demonstrates the uniqueness of architecture in both operational semantics and practical outcomes. This contribution lays the groundwork for a new theory of epistemic quantum computing capable of modelling and acting under uncertainty beyond traditional paradigms. Full article
(This article belongs to the Special Issue Probability Theory and Quantum Information)
Show Figures

Figure 1

28 pages, 616 KB  
Article
UAVThreatBench: A UAV Cybersecurity Risk Assessment Dataset and Empirical Benchmarking of LLMs for Threat Identification
by Padma Iyenghar
Drones 2025, 9(9), 657; https://doi.org/10.3390/drones9090657 - 18 Sep 2025
Viewed by 312
Abstract
UAVThreatBench introduces the first structured benchmark for evaluating large language models in cybersecurity threat identification for unmanned aerial vehicles operating within industrial indoor settings, aligned with the European Radio Equipment Directive. The benchmark consists of 924 expert-curated industrial scenarios, each annotated with five [...] Read more.
UAVThreatBench introduces the first structured benchmark for evaluating large language models in cybersecurity threat identification for unmanned aerial vehicles operating within industrial indoor settings, aligned with the European Radio Equipment Directive. The benchmark consists of 924 expert-curated industrial scenarios, each annotated with five cybersecurity threats, yielding a total of 4620 threats mapped to directive articles on network and device integrity, personal data and privacy protection, and prevention of fraud and economic harm. Seven state-of-the-art models from the OpenAI GPT family and the LLaMA family were systematically assessed on a representative subset of 100 scenarios from the UAVThreatBench dataset. The evaluation applied a fuzzy matching threshold of 70 to compare model-generated threats against expert-defined ground truth. The strongest model identified nearly nine out of ten threats correctly, with close to half of the scenarios achieving perfect alignment, while other models achieved lower but still substantial alignment. Semantic error analysis revealed systematic weaknesses, particularly in identifying availability-related threats, backend-layer vulnerabilities, and clause-level regulatory mappings. UAVThreatBench therefore establishes a reproducible foundation for regulatory-compliant cybersecurity threat identification in safety-critical unmanned aerial vehicle environments. The complete benchmark dataset and evaluation results are openly released under the MIT license through a dedicated online repository. Full article
Show Figures

Figure 1

31 pages, 1507 KB  
Review
Cybersecurity in MAS-Based Adaptive Protection for Microgrids—A Review
by Armando J. Taveras Cruz, Miguel Aybar-Mejía, Carlos G. Colon-González, Deyslen Mariano-Hernández, Jesús C. Hernandez, Fabio Andrade-Rengifo and Luis Hernández-Callejo
Electronics 2025, 14(18), 3663; https://doi.org/10.3390/electronics14183663 - 16 Sep 2025
Viewed by 433
Abstract
With the ever-growing reliance on digital communication networks in microgrids equipped with digital control systems and highly distributed energy resources, the threat of cyberattacks is more present than ever. Therefore, a robust cybersecurity response framework could be in place to secure smart grids, [...] Read more.
With the ever-growing reliance on digital communication networks in microgrids equipped with digital control systems and highly distributed energy resources, the threat of cyberattacks is more present than ever. Therefore, a robust cybersecurity response framework could be in place to secure smart grids, including microgrids, against cyberattacks. Adaptive protection systems, which are crucial for microgrid reliability and resilience, are also vulnerable. On the other hand, multi-agent systems are often employed in microgrid adaptive protection, providing a decentralized and cooperative framework where intelligent agents can monitor system conditions, exchange information, and detect anomalies. Many researchers in the literature have focused on addressing microgrid protection with multi-agent systems against physical faults in scenarios with various degrees of distributed energy resource penetration. Other research efforts have leveraged multi-agent systems, as well as technologies such as artificial intelligence, machine learning, advanced encryption, and authentication, to enhance the capabilities of microgrids for maintaining resilient operation under cyberattacks. However, both physical and cybersecurity anomalies have rarely been tackled in the same scheme. This paper aims to provide a systematic review of the use of cybersecurity strategies for multi-agent-based adaptive protection schemes. From the results of this study, it was found that most research efforts do not address microgrid protection with an integrated approach, considering both physical and cybersecurity threats, as well as the application of established industry communication and cybersecurity standards. All of this, while maintaining scalability and performance, is crucial. Full article
(This article belongs to the Special Issue Innovations in Intelligent Microgrid Operation and Control)
Show Figures

Figure 1

17 pages, 1816 KB  
Article
Welcome to the Machine (WTTM): A Cybersecurity Framework for the Automotive Sector
by Enrico Picano and Massimo Fontana
Electronics 2025, 14(18), 3645; https://doi.org/10.3390/electronics14183645 - 15 Sep 2025
Viewed by 466
Abstract
Cybersecurity has become a critical concern in the automotive sector, where the increasing connectivity and complexity of modern vehicles—particularly in the context of autonomous driving—have significantly expanded the attack surface. In response to these challenges, this paper presents the Welcome To The Machine [...] Read more.
Cybersecurity has become a critical concern in the automotive sector, where the increasing connectivity and complexity of modern vehicles—particularly in the context of autonomous driving—have significantly expanded the attack surface. In response to these challenges, this paper presents the Welcome To The Machine (WTTM) framework, developed to support proactive and structured cyber risk management throughout the entire vehicle lifecycle. Specifically tailored to the automotive domain, the framework encompasses four core actions: detection, analysis, response, and remediation. A central element of WTTM is the WTTM Questionnaire, designed to assess the organizational cybersecurity maturity of automotive manufacturers and suppliers. The questionnaire addresses six key areas: Governance, Risk Management, Concept and Design, Security Requirements, Validation and Testing, and Supply Chain. This paper focuses on the development and validation of WTTM-Q. Statistical validation was performed using responses from 43 participants, demonstrating high internal consistency (Cronbach’s alpha > 0.70) and strong construct validity (CFI = 0.94, RMSEA = 0.061). A supervised classifier (XGBoost), trained on 115 hypothetical response configurations, was employed to predict a priori risk classes, achieving 78% accuracy and a ROC AUC of 0.84. The WTTM framework, supported by a Vehicle Security Operations Center, provides a scalable, standards-aligned solution for enhancing cybersecurity in the automotive industry. Full article
Show Figures

Figure 1

22 pages, 7476 KB  
Article
Neural Network for Robotic Control and Security in Resistant Settings
by Kubra Kose, Nuri Alperen Kose and Fan Liang
Electronics 2025, 14(18), 3618; https://doi.org/10.3390/electronics14183618 - 12 Sep 2025
Viewed by 391
Abstract
As the industrial automation landscape advances, the integration of sophisticated perception and manipulation technologies into robotic systems has become crucial for enhancing operational efficiency and precision. This paper presents a significant enhancement to a robotic system by incorporating the Mask R-CNN deep learning [...] Read more.
As the industrial automation landscape advances, the integration of sophisticated perception and manipulation technologies into robotic systems has become crucial for enhancing operational efficiency and precision. This paper presents a significant enhancement to a robotic system by incorporating the Mask R-CNN deep learning algorithm and the Intel® RealSense™ D435 camera with the UFactory xArm 5 robotic arm. The Mask R-CNN algorithm, known for its powerful object detection and segmentation capabilities, combined with the depth-sensing features of the D435, enables the robotic system to perform complex tasks with high accuracy. This integration facilitates the detection, manipulation, and precise placement of single objects, achieving 98% detection accuracy, 98% gripping accuracy, and 100% transport accuracy, resulting in a peak manipulation accuracy of 99%. Experimental evaluations demonstrate a 20% improvement in manipulation success rates with the incorporation of depth data, reflecting significant enhancements in operational flexibility and efficiency. Additionally, the system was evaluated under adversarial conditions where structured noise was introduced to test its stability, leading to only a minor reduction in performance. Furthermore, this study delves into cybersecurity concerns pertinent to robotic systems, addressing vulnerabilities such as physical attacks, network breaches, and operating system exploits. The study also addresses specific threats, including sabotage and service disruptions, and emphasizes the importance of implementing comprehensive cybersecurity measures to protect advanced robotic systems in manufacturing environments. To ensure truly robust, secure, and reliable robotic operations in industrial environments, this paper highlights the critical role of international cybersecurity standards and safety standards for the physical protection of industrial robot applications and their human operators. Full article
Show Figures

Figure 1

19 pages, 1693 KB  
Systematic Review
Integration of Connected Autonomous Vehicles in the Transportation Networks: A Systematic Review
by Fabricio Esteban Espinoza-Molina, Gustavo Javier Aguilar Miranda, Jaqueline Balseca and J. P. Díaz-Samaniego
Vehicles 2025, 7(3), 98; https://doi.org/10.3390/vehicles7030098 - 12 Sep 2025
Viewed by 423
Abstract
Connected Autonomous Vehicles (CAVs) are expected to reshape transportation systems, yet their role in enhancing network robustness remains underexplored. This research intends to fill this gap by conducting a systematic review based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses protocol [...] Read more.
Connected Autonomous Vehicles (CAVs) are expected to reshape transportation systems, yet their role in enhancing network robustness remains underexplored. This research intends to fill this gap by conducting a systematic review based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses protocol (PRISMA) to analyze 21 peer-reviewed publications identified from Scopus, Web of Science, and ScienceDirect. Articles were classified into five thematic areas: (1) system robustness, (2) infrastructure adaptation, (3) traffic flow and behavior, (4) security and communication, and (5) environmental impact. The results show that CAVs have the potential to improve robustness in transportation networks, thus helping the efficiency of transportation networks, reducing cyber vulnerability, and mitigating environmental impact. However, despite several advantages, CAVs also present challenges, including new infrastructure or updates to cybersecurity standards. This review contributes to the literature by consolidating current approaches, highlighting knowledge gaps, and offering methodological insights to guide research and policy development toward resilient, sustainable, and connected mobility systems. Full article
Show Figures

Figure 1

18 pages, 3408 KB  
Article
Enhancing Traditional Reactive Digital Forensics to a Proactive Digital Forensics Standard Operating Procedure (P-DEFSOP): A Case Study of DEFSOP and ISO 27035
by Hung-Cheng Yang, I-Long Lin and Yung-Hung Chao
Appl. Sci. 2025, 15(18), 9922; https://doi.org/10.3390/app15189922 - 10 Sep 2025
Viewed by 428
Abstract
With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical imperatives. Cloud environments, in particular, present substantial challenges due to the limited availability [...] Read more.
With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical imperatives. Cloud environments, in particular, present substantial challenges due to the limited availability of effective forensic tools and the pressing demand for impartial and legally admissible digital evidence. To address these challenges, we propose a proactive digital forensics mechanism (P-DFM) designed for emergency incident management in enterprise settings. This mechanism integrates a range of forensic tools to identify and preserve critical digital evidence. It also incorporates the MITRE ATT&CK framework with Security Information and Event Management (SIEM) and Managed Detection and Response (MDR) systems to enable comprehensive and timely threat detection and analysis. The principal contribution of this study is the formulation of a novel Proactive Digital Evidence Forensics Standard Operating Procedure (P-DEFSOP), which enhances the accuracy and efficiency of security threat detection and forensic analysis while ensuring that digital evidence remains legally admissible. This advancement significantly reinforces the cybersecurity posture of enterprise networks. Our approach is systematically grounded in the Digital Evidence Forensics Standard Operating Procedure (DEFSOP) framework and complies with internationally recognized digital forensic standards, including ISO/IEC 27035 and ISO/IEC 27037, to ensure the integrity, reliability, validity, and legal admissibility of digital evidence throughout the forensic process. Given the complexity of cloud computing infrastructures—such as Chunghwa Telecom HiCloud, Amazon Web Services (AWS), Google Cloud, and Microsoft Azure—we underscore the critical importance of impartial and standardized digital forensic services in cloud-based environments. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

19 pages, 1501 KB  
Article
Federated AI-OCPP Framework for Secure and Scalable EV Charging in Smart Cities
by Md Sabbir Hossen, Md Tanjil Sarker, Md Serajun Nabi, Hasanul Bannah, Gobbi Ramasamy and Ngu Eng Eng
Urban Sci. 2025, 9(9), 363; https://doi.org/10.3390/urbansci9090363 - 10 Sep 2025
Viewed by 323
Abstract
The rapid adoption of electric vehicles (EVs) has intensified the demand for intelligent, scalable, and interoperable charging infrastructure. Traditional EV charging networks based on the Open Charge Point Protocol (OCPP) face challenges related to dynamic load management, cybersecurity, and efficient integration with renewable [...] Read more.
The rapid adoption of electric vehicles (EVs) has intensified the demand for intelligent, scalable, and interoperable charging infrastructure. Traditional EV charging networks based on the Open Charge Point Protocol (OCPP) face challenges related to dynamic load management, cybersecurity, and efficient integration with renewable energy sources. This paper presents a novel AI-driven framework that integrates federated learning, predictive analytics, and real-time control within OCPP-compliant networks to enhance performance and sustainability. The proposed system utilizes edge AI modules at charging stations, supported by a central aggregator that employs federated learning to preserve data privacy while enabling network-wide optimization. A case study involving simulated smart charging stations demonstrates significant improvements, including an 18% reduction in peak load demand, a 29% increase in forecasting accuracy (MAPE of 8.5%), a 10% decrease in average charging wait times, and a 12% increase in on-site solar energy utilization. The framework’s compatibility with OCPP and related standards (e.g., IEC 61851, ISO 15118) ensures ease of deployment on existing infrastructure. These results indicate that the proposed AI-OCPP integration provides a scalable and intelligent foundation for next-generation EV charging networks that align with the goals of sustainable transportation and smart grid evolution. Full article
Show Figures

Figure 1

36 pages, 1547 KB  
Review
UAV–Ground Vehicle Collaborative Delivery in Emergency Response: A Review of Key Technologies and Future Trends
by Yizhe Wang, Jie Li, Xiaoguang Yang and Qing Peng
Appl. Sci. 2025, 15(17), 9803; https://doi.org/10.3390/app15179803 - 6 Sep 2025
Viewed by 1330
Abstract
UAV delivery and ground transfer scheduling in emergency scenarios represent critical technological systems for enhancing disaster response capabilities and safeguarding lives and property. This study systematically reviews recent advances across eight core research domains: UAV emergency delivery systems, ground–air integrated transportation coordination, emergency [...] Read more.
UAV delivery and ground transfer scheduling in emergency scenarios represent critical technological systems for enhancing disaster response capabilities and safeguarding lives and property. This study systematically reviews recent advances across eight core research domains: UAV emergency delivery systems, ground–air integrated transportation coordination, emergency logistics optimization, UAV path planning and scheduling algorithms, collaborative optimization between ground vehicles and UAVs, emergency response decision support systems, low-altitude economy and urban air traffic management, and intelligent transportation system integration. Research findings indicate that UAV delivery technologies in emergency contexts have evolved from single-aircraft applications to intelligent multi-modal collaborative systems, demonstrating significant advantages in medical supply distribution, disaster relief, and search-and-rescue operations. Current technological development exhibits four major trends: hybrid optimization algorithms, multi-UAV cooperation, artificial intelligence enhancement, and real-time adaptation capabilities. However, critical challenges persist, including regulatory framework integration, adverse weather adaptability, cybersecurity protection, human–machine interface design, cost–benefit assessment, and standardization deficiencies. Future research should prioritize distributed decision architectures, robustness optimization, cross-domain collaboration mechanisms, emerging technology integration, and practical application validation. This comprehensive review provides systematic theoretical foundations and practical guidance for emergency management agencies in formulating technology development strategies, enterprises in investment planning, and research institutions in determining research priorities. Full article
(This article belongs to the Special Issue Artificial Intelligence in Drone and UAV)
Show Figures

Figure 1

29 pages, 2570 KB  
Article
Governance Framework for Intelligent Digital Twin Systems in Battery Storage: Aligning Standards, Market Incentives, and Cybersecurity for Decision Support of Digital Twin in BESS
by April Lia Hananto and Ibham Veza
Computers 2025, 14(9), 365; https://doi.org/10.3390/computers14090365 - 2 Sep 2025
Viewed by 619
Abstract
Digital twins represent a transformative innovation for battery energy storage systems (BESS), offering real-time virtual replicas of physical batteries that enable accurate monitoring, predictive analytics, and advanced control strategies. These capabilities promise to significantly enhance system efficiency, reliability, and lifespan. Yet, despite the [...] Read more.
Digital twins represent a transformative innovation for battery energy storage systems (BESS), offering real-time virtual replicas of physical batteries that enable accurate monitoring, predictive analytics, and advanced control strategies. These capabilities promise to significantly enhance system efficiency, reliability, and lifespan. Yet, despite the clear technical potential, large-scale deployment of digital twin-enabled battery systems faces critical governance barriers. This study identifies three major challenges: fragmented standards and lack of interoperability, weak or misaligned market incentives, and insufficient cybersecurity safeguards for interconnected systems. The central contribution of this research is the development of a comprehensive governance framework that aligns these three pillars—standards, market and regulatory incentives, and cybersecurity—into an integrated model. Findings indicate that harmonized standards reduce integration costs and build trust across vendors and operators, while supportive regulatory and market mechanisms can explicitly reward the benefits of digital twins, including improved reliability, extended battery life, and enhanced participation in energy markets. For example, simulation-based evidence suggests that digital twin-guided thermal and operational strategies can extend usable battery capacity by up to five percent, providing both technical and economic benefits. At the same time, embedding robust cybersecurity practices ensures that the adoption of digital twins does not introduce vulnerabilities that could threaten grid stability. Beyond identifying governance gaps, this study proposes an actionable implementation roadmap categorized into short-, medium-, and long-term strategies rather than fixed calendar dates, ensuring adaptability across different jurisdictions. Short-term actions include establishing terminology standards and piloting incentive programs. Medium-term measures involve mandating interoperability protocols and embedding digital twin requirements in market rules, and long-term strategies focus on achieving global harmonization and universal plug-and-play interoperability. International examples from Europe, North America, and Asia–Pacific illustrate how coordinated governance can accelerate adoption while safeguarding energy infrastructure. By combining technical analysis with policy and governance insights, this study advances both the scholarly and practical understanding of digital twin deployment in BESSs. The findings provide policymakers, regulators, industry leaders, and system operators with a clear framework to close governance gaps, maximize the value of digital twins, and enable more secure, reliable, and sustainable integration of energy storage into future power systems. Full article
(This article belongs to the Section AI-Driven Innovations)
Show Figures

Figure 1

8 pages, 743 KB  
Proceeding Paper
A Prototype of Integrated Remote Patient Monitoring System
by Georgi Patrikov, Teodora Bakardjieva, Antonina Ivanova, Andriana Ivanova and Fatima Sapundzhi
Eng. Proc. 2025, 104(1), 68; https://doi.org/10.3390/engproc2025104068 - 29 Aug 2025
Viewed by 438
Abstract
The ongoing global shortage of healthcare personnel, exacerbated by demographic changes and the aftermath of the COVID-19 pandemic, has highlighted the need for efficient workforce utilization and innovative technological support in healthcare. This paper presents LifeLink Monitoring, a prototype of an integrated remote [...] Read more.
The ongoing global shortage of healthcare personnel, exacerbated by demographic changes and the aftermath of the COVID-19 pandemic, has highlighted the need for efficient workforce utilization and innovative technological support in healthcare. This paper presents LifeLink Monitoring, a prototype of an integrated remote patient monitoring system designed to optimize clinical workflows, support medical personnel, and enhance patient care without replacing human expertise. The system enables real-time patient observation through AI-powered devices, providing automated alerts, live video feeds, and intelligent task management to reduce the burden of non-clinical duties on healthcare professionals. Applications include hospitals, hospices, home care, and remote locations. Key features include seamless integration with medical devices and national health records, advanced computer vision and audio analysis, multi-level deployment models, and a blockchain-secured architecture ensuring high data privacy and cybersecurity standards. Additionally, LifeLink incorporates an entertainment module aimed at improving patient emotional well-being. The solution represents a convergence of artificial and human intelligence to improve healthcare delivery, personnel efficiency, and patient outcomes. Full article
Show Figures

Figure 1

20 pages, 3174 KB  
Review
Threat Landscape and Integrated Cybersecurity Framework for V2V and Autonomous Electric Vehicles
by Kithmini Godewatte Arachchige, Ghanem Alkaabi, Mohsin Murtaza, Qazi Emad Ul Haq, Abedallah Zaid Abualkishik and Cheng-Chi Lee
World Electr. Veh. J. 2025, 16(8), 469; https://doi.org/10.3390/wevj16080469 - 18 Aug 2025
Viewed by 966
Abstract
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily [...] Read more.
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily life, their susceptibility to cyber threats such as replay, jamming, spoofing, and denial-of-service (DoS) attacks necessitates the development of robust cybersecurity measures. Additionally, EV-specific threats, including battery management system (BMS) exploitation and compromised charging interfaces, introduce distinct vulnerabilities requiring specialized attention. This research proposes a comprehensive and integrated cybersecurity framework that rigorously examines current V2V, vehicle-to-everything (V2X), and EV-specific systems through systematic threat assessments, vulnerability analyses, and the deployment of advanced security controls. Unlike previous state-of-the-art approaches, which primarily focus on isolated threats or specific components such as V2V protocols, the proposed framework provides a holistic cybersecurity strategy addressing the entire communication stack, EV subsystems, and incorporates AI-driven threat detection mechanisms. This comprehensive and integrated approach addresses critical gaps found in the existing literature, making it significantly more adaptable and resilient against evolving cyber-attacks. Our framework aligns with industry standards and regulatory requirements, significantly enhancing the security, safety, and reliability of modern transportation systems. By incorporating specialized cryptographic techniques, secure protocols, and continuous monitoring mechanisms, the proposed approach ensures robust protection against sophisticated cyber threats, thereby safeguarding vehicle operations and user privacy. Full article
Show Figures

Figure 1

21 pages, 1550 KB  
Article
Exploiting Maritime Wi-Fi: Practical Assessment of Onboard Network Vulnerabilities
by Marko Vukšić, Jasmin Ćelić, Ivan Panić and Aleksandar Cuculić
J. Mar. Sci. Eng. 2025, 13(8), 1576; https://doi.org/10.3390/jmse13081576 - 17 Aug 2025
Viewed by 815
Abstract
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern. Wireless networks on ships, although essential for operations and crew [...] Read more.
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern. Wireless networks on ships, although essential for operations and crew welfare, often lack sufficient protection and are frequently overlooked in broader cybersecurity strategies. This article explores vulnerabilities linked to Man-in-the-Middle attacks and rogue access points, particularly in port areas where attackers may exploit signal range and proximity. A simulation carried out in a public setting near the Port of Rijeka demonstrated how standard crew devices could be lured into connecting to a counterfeit Wi-Fi network, resulting in traffic interception and potential data leaks. Although practical limitations, such as signal attenuation and distance, reduce the feasibility of such intrusions at sea, the risk remains significant while in port. Insecure configurations and common user behaviors were identified as key enablers. The article outlines a series of countermeasures aligned with international guidelines ranging from segmentation and encryption to crew training and intrusion detection. Addressing these wireless vulnerabilities is essential for building resilience and ensuring that digital transformation efforts in the maritime sector do not come at the expense of security. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

Back to TopTop