AG

Amrita Ghosal

Authored

20 records found

Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires ...
Current trends forecast that Over-the-Air (OTA) software updates will be highly significant for future connected vehicles. The OTA update will enable upgrading the vehicle functionalities or bug fixations in the embedded software installed on its Electronic Control Units (ECUs) r ...
In its latest report, the United States National Highway Traffic Safety Administration (NHTSA) registered some 37,300 fatalities for the yearly victims of motor vehicle accidents in 2017. Vehicle-to-everything (V2X) is playing an important role in improving road safety, traffic e ...

STRIDE

Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles

Current trends forecast that Over-The-Air (OTA) software updates will be highly significant for future autonomous vehicles. The OTA update will enable fast distribution of software updates and fixing bugs in the embedded software installed on its electronic control units. However ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

Invoice #31415 attached

Automated analysis of malicious Microsoft Office documents

Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the platform's dynamic features, use it to launch th ...

AutoSec

Secure Automotive Data Transmission Scheme for In-Vehicle Networks

Modern vehicles comprise hundreds of Electronic Control Units (ECUs) and sensors for enhancing numerous security and comfort-related functionalities. The ECUs perform real-time information exchange, such as automotive instructions over the Controller Area Network (CAN) bus. Howev ...