References
Abu Al-Haija, Q., & Zein-Sabatto, S. (2020). An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics, 9(12), 2152. https://doi.org/10.3390/electronics9122152
Search via ReFindit
Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Complexity, 2021(1), 5579851. https://doi.org/10.1155/2021/5579851
Search via ReFindit
Almasoud, A.S., Eisa, T.A.E., Al-Wesabi, F.N., Elsafi, A., Duhayyim, M.A., Yaseen, I., Hamza, M.A., Motwakel, A. (2022). Parkinson's Detection Using RNN-Graph-LSTM with OptimizationOptimization Based on Speech Signals. Computers, Materials and Continua, 72(1), 871-886. https://doi.org/10.32604/cmc.2022.024596
Search via ReFindit
Alsaade, F. W., & Al-Adhaileh, M. H. (2023). Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. Sensors, 23(8), 4086. https://doi.org/10.3390/s23084086
Search via ReFindit
Alsulami, A. A., Abu Al-Haija, Q., Alqahtani, A., & Alsini, R. (2022). Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model. Symmetry, 14(7), 1450. https://doi.org/10.3390/sym14071450
Search via ReFindit
Biddle, L., & Fallah, S. (2021). A Novel Fault Detection, Identification and Prediction Approach for Autonomous Vehicle Controllers Using SVM. Automotive Innovation, 4(3), 301-314. https://doi.org/10.1007/s42154-021-00138-0
Search via ReFindit
Bogdoll, D., Hamdard, I., Rößler, L. N., Geisler, F., Bayram, M., Wang, F., … Zöllner, J. M. (2024, September 26). AnoVox: A Benchmark for Multimodal Anomaly Detection in Autonomous Driving. arXiv. https://doi.org/10.48550/arXiv.2405.07865
Search via ReFindit
Bonzanini, A. D., Mesbah, A., & Di Cairano, S. (2024). Perception-aware model predictive control for constrained control in unknown environments. Automatica, 160, 111418. https://doi.org/10.1016/j.automatica.2023.111418
Search via ReFindit
Brain, S., & Oyadeyi, O. (2023). Funding Crime Online: Cybercrime and its Links to OrganizedOrganized Crime in the Caribbean. The Commonwealth Cybercrime Journal, 1(3), 84-110.
Search via ReFindit
CAR 2 CAR Communication Consortium. (2021). White Paper on Misbehaviour Detection and Reporting to Misbehaviour Authority. CAR 2 CAR Communication Consortium.
Search via ReFindit
Check Point Team. (2024, July 16). Check Point Research Reports Highest Increase of Global Cyber Attacks seen in last two years – a 30% Increase in Q2 2024 Global Cyber Attacks. Retrieved August 25, 2025, from Check Point Blog website: https://blog.checkpoint.com/research/check-point-research-reports-highest-increase-of-global-cyber-attacks-seen-in-last-two-years-a-30-increase-in-q2-2024-global-cyber-attacks/
Search via ReFindit
Chen, C.-Y., Shin, K. G., & Dadras, S. (2024). Context-Aware Anomaly Detection Using Vehicle Dynamics. Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 531-545. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3678890.3678895
Search via ReFindit
Cobos, E., & Diao, H. (2024, November 28). From fiction to reality: How Latin America became the world’s most critical cyber battleground. Retrieved August 24, 2025, from World Bank Blogs website: https://blogs.worldbank.org/en/latinamerica/seguridad-cibernetica-en-america-latina-y-el-caribe
Search via ReFindit
CrowdStrike. (2025). 2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises. CrowdStrike. Retrieved from https://ir.crowdstrike.com/node/14226/pdf
Search via ReFindit
CSIS. (2025, May). Significant Cyber Incidents. Retrieved August 24, 2025, from https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
Search via ReFindit
Fails, J. A., & Olsen, D. R. (2003). Interactive machine learning. Proceedings of the 8th International Conference on Intelligent User Interfaces, 39-45. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/604045.604056
Search via ReFindit
FortiGuard Labs. (2025). 2025 Global Threat Landscape Report. Retrieved from https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-landscape-report-2025.pdf
Search via ReFindit
Griffor, E. R., Greer, C., Wollman, D. A., & Burns, M. J. (2017). Framework for cyber-physical systems: Volume 2, working group reports (No. NIST SP 1500-202; p. NIST SP 1500-202). Gaithersburg, MD: National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.1500-202
Search via ReFindit
Guo, H., Sun, J., & Pang, Z.-H. (2023). Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems. IEEE/CAA Journal of Automatica Sinica, 10(5), 1181-1191. https://doi.org/10.1109/JAS.2023.123441
Search via ReFindit
Hamza, M., Ben, S., Larabi-Marie-Sainte, S., Nour, M., Al-Wesabi, F., Motwakel, A., … Duhayyim, M. (2022). Optimal Bidirectional LSTM for Modulation Signal Classification in Communication Systems. Computers, Materials & Continua, 72(2), 3055-3071. https://doi.org/10.32604/cmc.2022.024490
Search via ReFindit
Hao, W., Yang, T., & Yang, Q. (2023). Hybrid Statistical-Machine Learning for Real-Time Anomaly Detection in Industrial Cyber–Physical Systems. IEEE Transactions on Automation Science and Engineering, 20(1), 32-46. https://doi.org/10.1109/TASE.2021.3073396
Search via ReFindit
Haq, I. U., Khan, T. A., & Akhunzada, A. (2021). A Dynamic Robust DL-Based Model for Android Malware Detection. IEEE Access, 9, 74510-74521. https://doi.org/10.1109/ACCESS.2021.3079370
Search via ReFindit
Hermann, A., Trkulja, N., Lucena, A. R. F. D., Kiening, A., Petrovska, A., & Kargl, F. (2024). WIP: A Trust Assessment Method for In-Vehicular Networks using Vehicle Risk Assessment. Proceedings Symposium on Vehicle Security & Privacy. Presented at the Symposium on Vehicle Security & Privacy, San Diego, CA, USA. San Diego, CA, USA: Internet Society. https://doi.org/10.14722/vehiclesec.2024.23016
Search via ReFindit
Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal, 4(6), 1802-1831. https://doi.org/10.1109/JIOT.2017.2703172
Search via ReFindit
Internet Crime Complaint Center. (2025). Federal Bureau of Investigation’s Internet Crime Report. Federal Bureau of Investigation. Retrieved from Federal Bureau of Investigation website: https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf
Search via ReFindit
Kalogiannis, K., Khodaei, M., Bayaa, W. M. N. M., & Papadimitratos, P. (2022). Attack Impact and Misbehavior Detection in Vehicular Platoons. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 45-59. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3507657.3528552
Search via ReFindit
Kaspersky Lab. (2025). Threat landscape for industrial automation systems. Q1 2025. Kaspersky Lab. Retrieved from https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-Threat-landscape-for-industrial-automation-systems-Q1-2025-En.pdf
Search via ReFindit
Khalil, S. M., Bahsi, H., Dola, H. O., Korõtko, T., McLaughlin, K., & Kotkas, V. (2023). Threat Modeling of Cyber-Physical Systems—A Case Study of a Microgrid System. Computers & Security, 124, 102950. https://doi.org/10.1016/j.cose.2022.102950
Search via ReFindit
Khan, S., Sivaraman, E., & Honnavalli, P. B. (2020). Performance Evaluation of Advanced Machine Learning Algorithms for Network Intrusion Detection System. In M. Dutta, C. R. Krishna, R. Kumar, & M. Kalra (Eds.), Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India (pp. 51-59). Singapore: Springer. https://doi.org/10.1007/978-981-15-3020-3_6
Search via ReFindit
Khraisat, A., Alazab, A., Singh, S., Jan, T., & Jr. Gomez, A. (2024). Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions. ACM Comput. Surv., 57(1), 7:1-7:38. https://doi.org/10.1145/3687124
Search via ReFindit
KnowBe4. (2024). Cyber Attacks on Infrastructure: The New Geopolitical Weapon. KnowBe4,. Retrieved from https://www.knowbe4.com/hubfs/Global-Infrastructure-Report-2024_EN_US.pdf
Search via ReFindit
Li, J., Yang, Y., Zhang, R., & Lee, Y. (2024, April 17). Overconfident and Unconfident AI Hinder Human-AI Collaboration. arXiv. https://doi.org/10.48550/arXiv.2402.07632
Search via ReFindit
Liu, Y., & Wang, W. (2021). A Safety Reinforced Cooperative Adaptive Cruise Control Strategy Accounting for Dynamic Vehicle-to-Vehicle Communication Failure. Sensors, 21(18), 6158. https://doi.org/10.3390/s21186158
Search via ReFindit
Malik, M. I., Ibrahim, A., Hannay, P., & Sikos, L. F. (2023). Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions. Computers, 12(4), 79. https://doi.org/10.3390/computers12040079
Search via ReFindit
Mohammed, A., Marine, L., Ramlal, C., & Muddeen, F. (2025). A Vehicular Cyber-Physical Framework for Studying the Effects of Multiple Disturbances with Application to Connected Autonomous Vehicles. Transport and Telecommunication Journal, 26(3), 250-265. https://doi.org/10.2478/ttj-2025-0019
Search via ReFindit
Mohammed, A., Ramlal, C., Marine, L., & Muddeen, F. (2024). Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks. Journal of Advanced Transportation, 2024(1), 2790548. https://doi.org/10.1155/2024/2790548
Search via ReFindit
Nelson, A., Rekhi, S., Souppaya, M., & Scarfone, K. (2025). Incident response recommendations and considerations for cybersecurity risk management: A CSF 2.0 community profile (No. NIST SP 800-61r3; p. NIST SP 800-61r3). Gaithersburg, MD: National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.SP.800-61r3
Search via ReFindit
Oucheikh, R., Fri, M., Fedouaki, F., & Hain, M. (2020). Deep Real-Time Anomaly Detection for Connected Autonomous Vehicles. Procedia Computer Science, 177, 456-461. https://doi.org/10.1016/j.procs.2020.10.062
Search via ReFindit
Palleti, V. R., Adepu, S., Mishra, V. K., & Mathur, A. (2021). Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity, 4(1), 8. https://doi.org/10.1186/s42400-021-00071-z
Search via ReFindit
Park, G. (2024). Optimal vehicle position estimation using adaptive unscented Kalman filter based on sensor fusion. Mechatronics, 99, 103144. https://doi.org/10.1016/j.mechatronics.2024.103144
Search via ReFindit
Positive Technologies. (2023, December 21). Cybersecurity threatscape for Latin America and the Caribbean: 2022–2023. Retrieved August 25, 2025, from Positive Technologies website: https://global.ptsecurity.com/en/research/analytics/latam-cybersecurity-threatscape-2022-2023/#Navigation-6
Search via ReFindit
Puig, V., Escobet, T., Sarrate, R., & Quevedo, J. (2016). Fault Detection and Isolation in Critical Infrastructure Systems. In C. G. Panayiotou, G. Ellinas, E. Kyriakides, & M. M. Polycarpou (Eds.), Critical Information Infrastructures Security (pp. 3-12). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31664-2_1
Search via ReFindit
Rajapaksha, S., Kalutarage, H., Al-Kadri, M. O., Petrovski, A., & Madzudzo, G. (2023). Improving In-vehicle Networks Intrusion Detection Using On-Device Transfer Learning. Proceedings Inaugural International Symposium on Vehicle Security & Privacy. Presented at the Inaugural International Symposium on Vehicle Security & Privacy, San Diego, CA, USA. San Diego, CA, USA: Internet Society. https://doi.org/10.14722/vehiclesec.2023.23088
Search via ReFindit
Rendall, K., Mylonas, A., Vidalis, S., & Gritzalis, D. (2025). MIDAS: Multi-layered attack detection architecture with decision optimizationoptimization. Computers & Security, 148, 104154. https://doi.org/10.1016/j.cose.2024.104154
Search via ReFindit
Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., … Sarwat, A. I. (2023). Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors, 23(8), 4060. https://doi.org/10.3390/s23084060
Search via ReFindit
Roh, H., Oh, S., Song, H., Han, J., & Lim, S. (2022). Deep Learning-based Wireless Signal Classification in the IoT Environment. Computers, Materials & Continua, 71(3), 5717–5732. https://doi.org/10.32604/cmc.2022.024135
Search via ReFindit
Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., & McQuaid, R. (2021). Developing cyber-resilient systems: A systems security engineering approach (No. NIST SP 800-160v2r1; p. NIST SP 800-160v2r1). Gaithersburg, MD: National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.SP.800-160v2r1
Search via ReFindit
Roy, T., & Dey, S. (2023, November 15). On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks. arXiv. https://doi.org/10.48550/arXiv.2311.09342
Search via ReFindit
Sajjadi, P., Dinmohammadi, F., & Shafiee, M. (2025). Fault Detection of Cyber-Physical Systems Using a Transfer Learning Method Based on Pre-Trained Transformers. Sensors (Basel, Switzerland), 25(13), 4164. https://doi.org/10.3390/s25134164
Search via ReFindit
Sarwar, A., Hasan, S., Khan, W. U., Ahmed, S., & Marwat, S. N. K. (2022). Design of an Advance Intrusion Detection System for IoT Networks. 2022 2nd International Conference on Artificial Intelligence (ICAI), 46-51. https://doi.org/10.1109/ICAI55435.2022.9773747
Search via ReFindit
Schaberreiter, T., Andriessen, J., Cappiello, C., Papanikolaou, A., & Pardijs, M. (2024). Human-in-the-loop Anomaly Detection and Contextual Intelligence for Enhancing Cybersecurity Management. In R. Mitkov, S. Ezzini, T. Ranasinghe, I. Ezeani, N. Khallaf, C. Acarturk, … P. Rayson (Eds.), Proceedings of the First International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (pp. 127-136). Lancaster, UK: International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security. Retrieved from https://aclanthology.org/2024.nlpaics-1.15/
Search via ReFindit
Song, Y., Hyun, S., & Cheong, Y.-G. (2021). Analysis of Autoencoders for Network Intrusion Detection. Sensors, 21(13), 4294. https://doi.org/10.3390/s21134294
Search via ReFindit
UNDP. (2022). United Nations Development Programme Digital Strategy 2022-2025. Retrieved from https://digitalstrategy.undp.org/documents/Digital-Strategy-2022-2025-Full-Document_ENG_Interactive.pdf
Search via ReFindit
Yang, T., Murguia, C., & Lv, C. (2023). Risk Assessment for Connected Vehicles Under Stealthy Attacks on Vehicle-to-Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems, 24(12), 13627-13638. https://doi.org/10.1109/TITS.2023.3292188
Search via ReFindit
Zhu, X., Shen, Y., Zhang, Z., & Yan, M. (2023). Stability Analysis of the Vehicular Platoon with Sensing Delay and Communication Delay: CTCR Paradigm via Dixon Resultant. Applied Sciences, 13(21), 11807. https://doi.org/10.3390/app132111807
Search via ReFindit