Paul Darby's research while affiliated with University of Louisiana at Lafayette and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (3)
The lack of security in today’s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle’s normal behavior. The attacker may exp...
Citations
... These security concerns are explored and listed based on the different cyber-attacks that target the vehicular systems, networks, and environment. We studied the existing vulnerabilities and attacks from different research papers, including [29][30][31][32][33][70][71][72][73]. We focus on the papers that discuss and analyze vehicular issues to work on solving them using AI techniques, among others. ...
... However, following commercial availability, several problems hindered the competition of EV with Conventional Vehicles (ICEV) such as infrastructure availability for large scale charging stations, more recharging time and sophisticated energy resources for recharging [28][29][30]. Moreover, charging management, uncoordinated and insecure interaction between EV and CS and load balancing on CS and some others [31][32][33]. Research on EVs is surveyed to find optimal smart charging management techniques for electric vehicle recharging and with control of EV charging distributed energy resources. ...
... Furthermore, the power supply must be regulated by dedicated hardware, not classical vehicles. Researchers discussed how the EV charging infrastructure could be exploited by attackers [9], however, neglecting the in-vehicle threats. Contribution. ...