Publikace

informace pocházejí z univerzitní databáze V3S

Autoři:
doc. Ing. Zdeněk Lokaj, Ph.D., LL.M.; Ing. Miroslav Vaniš, Ph.D.; Ing. Radek Holý, Ph.D.; Ing. Martin Šrotýř, Ph.D.; Ing. Martin Zajíček; Huang, S.-C.
Publikováno:
2024, Applied Sciences, 14 (20), ISSN 2076-3417
Anotace:
In the field of Cooperative Intelligent Transport Systems (C-ITSs), the traditional approach to testing often emphasizes technological parameters, leaving the validation of message content insufficiently addressed. Since the content of these messages is crucial for the correct functioning of C-ITS, this article demonstrates the potential for automated evaluation of C-ITS message content against relevant standards. It leverages our novel tools, Karlos and C-ITS SIM, to facilitate this process. Through detailed laboratory testing and data analysis, the study showcases the effectiveness of these automated solutions in enhancing the accuracy and reliability of message content validation.
DOI:
Typ:
Článek v periodiku excerpovaném SCI Expanded

Autoři:
Ing. Martin Zajíček; doc. Ing. Tomáš Tichý, Ph.D., MBA; doc. Ing. Zdeněk Lokaj, Ph.D., LL.M.; Ing. Martin Šrotýř, Ph.D.
Publikováno:
2024, 2024 Smart City Symposium Prague - IEEE PROCEEDINGS, New York, IEEE Press), ISBN 979-8-3503-6096-7, ISSN 2831-5618
Anotace:
In the era of Industry 4.0 and the rise of smart cities, the integration of industrial and telematics systems has become increasingly prevalent, revolutionizing the way we manage and optimize processes. These systems, which encompass everything from manufacturing plants to transportation networks, rely heavily on interconnected devices and data exchange to enhance efficiency and functionality. However, this interconnectedness also brings about a heightened level of vulnerability to cyber threats, emphasizing the critical importance of robust cybersecurity measures. This article specifically delves into a case study of a selected Denial of Service (DoS) cyber attack on industrial networks, highlighting the critical need for such cybersecurity solutions. Current software was utilized to simulate an attack. The results are provided using the software that was created specifically for this type of task, demonstrating the practical application and effectiveness of these cybersecurity measures in real-world scenarios.
DOI:
Typ:
Stať ve sborníku z prestižní konf.

Autoři:
doc. Ing. Zdeněk Lokaj, Ph.D., LL.M.; doc. Ing. Tomáš Tichý, Ph.D., MBA; Ing. Miroslav Vaniš, Ph.D.; Hejlík, T.; Šmerda, T.; Ing. Martin Zajíček
Publikováno:
2024
Anotace:
Tato souhrnná zpráva analyzuje kybernetické hrozby a zranitelnosti tunelových systémů jako součásti kritické dopravní infrastruktury. Popisuje architekturu tunelových systémů, metodologii analýzy rizik a hodnotí klíčová aktiva z hlediska důvěrnosti, integrity a dostupnosti. Zaměřuje se na aktuální kybernetické hrozby, zranitelnosti a možnosti jejich zneužití, přičemž navrhuje mitigace a ochranná opatření. Dokument je určen pro odborníky na kybernetickou bezpečnost a správce tunelových systémů, aby zvýšil jejich odolnost vůči kybernetickým útokům.
Typ:
Výzkumná zpráva v češtině