Publikace UTB
Repozitář publikační činnosti UTB

Inclusion of cyber security mechanisms in the development of the telematics system

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Inclusion of cyber security mechanisms in the development of the telematics system en
dc.contributor.author Handriková, Jana
dc.contributor.author Mihoková Jakubčeková, Júlia
dc.contributor.author Stachová, Darina
dc.contributor.author Benčíková, Eleonóra
dc.relation.ispartof Transbaltica XII: Transportation Science and Technology
dc.identifier.issn 2523-3440 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.issn 2523-3459 Scopus Sources, Sherpa/RoMEO, JCR
dc.date.issued 2022
dc.citation.spage 375
dc.citation.epage 384
dc.event.title 12th International Scientific Conference on Transbaltica - Transportation Science and Technology (TRANSBALTICA)
dc.event.location Vilnius
utb.event.state-en Lithuania
utb.event.state-cs Litva
dc.event.sdate 2021-09-16
dc.event.edate 2021-09-17
dc.type conferenceObject
dc.language.iso en
dc.publisher Springer International Publishing Ag
dc.identifier.doi 10.1007/978-3-030-94774-3_37
dc.relation.uri https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37
dc.subject cyber security en
dc.subject cyber risk en
dc.subject cyber threat en
dc.subject cyber terrorism en
dc.subject cyber-attack en
dc.subject critical infrastructure en
dc.subject cyber space en
dc.description.abstract The increase in demand for the transport of people and goods is leading to a rapid development of transport systems. Data protection must include the privacy and security of end users, service providers and application providers. In this document, we propose a new data protection framework based on privacy and security technologies. Privacy technology allows users and service providers to define a flexible data model. Security technology provides traditional features such as encryption, authentication, and denial. In addition, it provides a secure environment for secure execution, which is necessary to restrict access to data for specific purposes. The increase in the number of system components places high demands on the management of the entire system. Intelligent control systems used by computer architectures such as cloud computing, fog computing, SDN or NFV architecture. The safety of this system is essential for safe and efficient transport. They also use development systems from research projects that improve the individual functions of telematics systems. Necessary solution already in the development phase, where the requirements of cyber security must be implemented. This study examines the weaknesses of cyber security. Threats and attacks exploiting these vulnerabilities are identified and classified. The final part proposes and discusses the development guidelines and mitigation strategies to be used in the development of autonomous and unmanned systems. en
utb.faculty Faculty of Logistics and Crisis Management
dc.identifier.uri http://hdl.handle.net/10563/1010943
utb.identifier.obdid 43883813
utb.identifier.wok 000763725500037
utb.source C-wok
dc.date.accessioned 2022-04-14T07:07:43Z
dc.date.available 2022-04-14T07:07:43Z
utb.contributor.internalauthor Benčíková, Eleonóra
utb.wos.affiliation [Handrikova, Jana; Jakubcekova, Julia Mihokova; Stachova, Darina] Univ Zilina, Fac Secur Engn, Univ 8215-1, Zilina 01026, Slovakia; [Bencikova, Eleonora] Tomas Bata Univ Zlin, Fac Logist & Crisis Management, Nam TG Masaryka 5555, Zlin 76001, Czech Republic
Find Full text

Soubory tohoto záznamu

Soubory Velikost Formát Zobrazit

K tomuto záznamu nejsou připojeny žádné soubory.

Zobrazit minimální záznam