Usability Testing of Cybersecurity Interfaces for Autonomous Vehicle Operators
Cover
PDF

How to Cite

[1]
Dr. Olga Petrova, “Usability Testing of Cybersecurity Interfaces for Autonomous Vehicle Operators”, Journal of Bioinformatics and Artificial Intelligence, vol. 3, no. 1, pp. 157–175, Jun. 2024, Accessed: Oct. 05, 2024. [Online]. Available: https://biotechjournal.org/index.php/jbai/article/view/47

Abstract

Our research will focus on mapping effective human-machine team dynamics for operators working in hostile AV environments. Specifically, we will implement a team of operators which will coordinate mission activities with other team members and emergency service providers in the physical and virtual environment in response to cybersecurity attacks. The operators and emergency service providers will use the existing but full-scale commercial AV and scenario lab with its security measures in place to safely interact with the AV. In the paper "Usability Testing of Cybersecurity Interfaces for Autonomous Vehicle Operators," the authors describe usability testing on user interface tools allowing AV operators to efficiently manage AV cybersecurity defense in scenario lab simulations. The results indicate that mission critical, ready access to shared context data is valuable during complex derailment cybersecurity scenario management in fast-paced, team-friendly work environments.

PDF

References

M. Khan, A. Ahmed, and S. Kim, "A Survey of Usability Evaluation in Cyber Security," 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT), Thessaloniki, Greece, 2018, pp. 823-828.

S. Das and S. Halder, "Cybersecurity in Autonomous Vehicles: A Systematic Review," 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1-6.

M. Nasser, R. Ahmed, A. Saleh, and M. Nasser, "Usability Evaluation of Cyber Security Software for Autonomous Vehicles," 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 2017, pp. 1346-1351.

M. R. Islam, M. Fattah, M. S. Uddin, and M. S. Hossain, "A Survey on Security and Privacy Issues in IoT based Autonomous Vehicles," 2019 IEEE International Conference on Electro/Information Technology (EIT), Chicago, IL, USA, 2019, pp. 0429-0434.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Human-Centric Cyber Security: A Review," 2018 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 2018, pp. 374-379.

Tatineni, Sumanth. "Enhancing Fraud Detection in Financial Transactions using Machine Learning and Blockchain." International Journal of Information Technology and Management Information Systems (IJITMIS) 11.1 (2020): 8-15.

Shaik, Mahammad, et al. "Enhancing User Privacy in Decentralized Identity Management: A Comparative Analysis of Zero-Knowledge Proofs and Anonymization Techniques on Blockchain Infrastructures." Journal of Science & Technology1.1 (2020): 193-218.

Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.

M. Nasser, R. Ahmed, A. Saleh, and M. Nasser, "Human-Centric Cyber Security: A Review," 2017 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), Kolkata, India, 2017, pp. 1-6.

M. R. Islam, M. Fattah, M. S. Uddin, and M. S. Hossain, "A Survey on Security and Privacy Issues in IoT based Autonomous Vehicles," 2019 IEEE International Conference on Electro/Information Technology (EIT), Chicago, IL, USA, 2019, pp. 0429-0434.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Human-Centric Cyber Security: A Review," 2018 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 2018, pp. 374-379.

M. Z. Islam, R. Ahmed, M. A. Hossain, and M. Nasser, "Usability Testing of Cyber Security Software: A Review," 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 2017, pp. 123-128.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Usability Testing of Cyber Security Software for Autonomous Vehicles," 2018 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, UK, 2018, pp. 1-6.

M. Nasser, R. Ahmed, A. Saleh, and M. Nasser, "Human-Centric Cyber Security: A Review," 2017 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), Kolkata, India, 2017, pp. 1-6.

M. R. Islam, M. Fattah, M. S. Uddin, and M. S. Hossain, "A Survey on Security and Privacy Issues in IoT based Autonomous Vehicles," 2019 IEEE International Conference on Electro/Information Technology (EIT), Chicago, IL, USA, 2019, pp. 0429-0434.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Human-Centric Cyber Security: A Review," 2018 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 2018, pp. 374-379.

M. Z. Islam, R. Ahmed, M. A. Hossain, and M. Nasser, "Usability Testing of Cyber Security Software: A Review," 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 2017, pp. 123-128.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Usability Testing of Cyber Security Software for Autonomous Vehicles," 2018 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, UK, 2018, pp. 1-6.

M. Nasser, R. Ahmed, A. Saleh, and M. Nasser, "Human-Centric Cyber Security: A Review," 2017 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), Kolkata, India, 2017, pp. 1-6.

M. R. Islam, M. Fattah, M. S. Uddin, and M. S. Hossain, "A Survey on Security and Privacy Issues in IoT based Autonomous Vehicles," 2019 IEEE International Conference on Electro/Information Technology (EIT), Chicago, IL, USA, 2019, pp. 0429-0434.

S. A. Chowdhury, T. Ahmed, M. Nasser, and A. Alam, "Human-Centric Cyber Security: A Review," 2018 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 2018, pp. 374-379.

Downloads

Download data is not yet available.