DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain.
Mubashar IqbalSabah SuhailRaimundas MatuleviciusPublished in: ARES (2024)
Keyphrases
- network security
- information security
- security issues
- public key infrastructure
- statistical databases
- intrusion detection
- security problems
- information assurance
- key management
- security threats
- security mechanisms
- security policies
- access control
- security requirements
- anomaly detection
- incomplete information
- security properties
- security level
- security protocols
- computer networks
- data security
- situation awareness
- digital technologies
- security systems
- security analysis
- computer security
- low cost
- security measures
- context aware
- functional requirements