• 183 Citations
  • 8 h-Index
20022019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

A review on safety failures, security attacks, and available countermeasures for autonomous vehicles

Cui, J., Liew, L. S., Sabaliauskaite, G. & Zhou, F., Jul 2019, In : Ad Hoc Networks. 90, 101823.

Research output: Contribution to journalReview article

Open Access
File
17 Citations (Scopus)
9 Downloads (Pure)

AVES – Automated vehicle safety and security analysis framework

Sabaliauskaite, G., Liew, L. S. & Zhou, F., 2019, Proceedings - CSCS 2019: ACM Computer Science in Cars Symposium. Association for Computing Machinery, p. 1-8 8 p. 4

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

1 Citation (Scopus)

Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles

Cui, J., Sabaliauskaite, G., Liew, L. S., Zhou, F. & Zhang, B., 11 Oct 2019, In : IEEE Access. 7, p. 148672 - 148683 12 p.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
5 Downloads (Pure)

Designing safe and secure mixed traffic systems

Sabaliauskaite, G., Liew, L. S., Zhou, F. & Cui, J., 25 Mar 2019, 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE). IEEE, p. 222 - 227 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Integrated safety and cybersecurity risk analysis of cooperative intelligent transport systems

Sabaliauskaite, G., Cui, J., Liew, L. S. & Zhou, F., 16 May 2019, 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS). 1 ed. IEEE

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

US2 : An unified safety and security analysis method for autonomous vehicles

Cui, J. & Sabaliauskaite, G., 2019, Advances in Information and Communication Networks: Proceedings of the 2018 Future of Information and Communication Conference. Arai, K., Kapoor, S. & Bhatia, R. (eds.). Springer, Vol. 886. p. 600-611 12 p. (Advances in Intelligent Systems and Computing).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2018

Cyber-security in robotics and autonomous systems

Matellán, V., Bonaci, T. & Sabaliauskaite, G., Feb 2018, In : Robotics and Autonomous Systems . 100, p. 41-42 2 p.

Research output: Contribution to journalEditorial

2 Citations (Scopus)

Defense System And Method Against Cyber-Physical Attacks

Mathur, A., Adepu, S., Shrivastava, S., Kaung, M. A., Tippenhauer, N. & Sabaliauskaite, G., 15 Mar 2018, IPC No. G06F 21/55 2013.01, G06Q 50/00 2012.01, World Intellectual Property Organization, Patent No. WO/2018/048351, 6 Sep 2017, Priority date 7 Sep 2016, Priority No. 10201607439T

Research output: Patent

Integrating Autonomous Vehicle Safety and Security Analysis Using STPA Method and the Six-Step Model

Sabaliauskaite, G., Liew, L. S. & Cui, J., 30 Jun 2018, In : International Journal on Advances in Security. 11, 1&2, p. 160-169 9 p.

Research output: Contribution to journalArticle

Open Access

Modelling safe and secure cooperative intelligent transport systems

Sabaliauskaite, G., Cui, J., Liew, L. S. & Zhou, F., 17 Nov 2018, Complex Systems Design & Management Asia. Cardin, M. A., Hastings, D., Jackson, P., Krob, D., Lui, P. C. & Schmitt, G. (eds.). Springer, Cham , p. 62-72 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2017

A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber–Physical Systems

Sabaliauskaite, G., Ng, G. S., Ruths, J. & Mathur, A., Dec 2017, In : Robotics and Autonomous Systems . 98, p. 174-191 18 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

A six-step model for safety and security analysis of cyber-physical systems

Sabaliauskaite, G., Adepu, S. & Mathur, A., 22 Nov 2017, Critical Information Infrastructures Security . Springer, Cham , p. 189-200 12 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

3 Citations (Scopus)

Comparison of corrupted sensor data detection methods in detecting stealthy attacks on cyber-physical systems

Sabaliauskaite, G., Ng, G. S., Ruths, J. & Mathur, A., 8 May 2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

1 Citation (Scopus)

Integrating six-step model with information flow diagrams for comprehensive analysis of cyber-physical system safety and security

Sabaliauskaite, G. & Adepu, S., 27 Apr 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, p. 41 - 48 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

8 Citations (Scopus)
2016

Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot

Sabaliauskaite, G., Ng, G. S., Ruths, J. & Mathur, A., 25 Aug 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, p. 482 - 489 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Empirical Assessment of Methods to Detect Cyber Attacks on a Robot

Sabaliauskaite, G., Ng, G. S., Ruths, J. & Mathur, A. P., 3 Mar 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

3 Citations (Scopus)

Experimental Evaluation of Stealthy Attack Detection in a Robot

Sabaliauskaite, G., Ng, G. S., Ruths, J. & Mathur, A., 7 Jan 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

6 Citations (Scopus)
2014

Challenges and practices in aligning requirements with verification and validation: a case study of six companies

Bjarnason, E., Runeson, P., Borg, M., Unterkalmsteiner, M., Engström, E., Regnell, B., Sabaliauskaite, G., Loconsole, A., Gorschek, T. & Feldt, R., Dec 2014, In : Empirical Software Engineering. 19, p. 1809–1855 47 p.

Research output: Contribution to journalArticle

47 Citations (Scopus)

Countermeasures to enhance cyber-physical system security and safety

Sabaliauskaite, G. & Mathur, A. P., 22 Sep 2014, Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

3 Citations (Scopus)

Design of intelligent checkers to enhance the security and safety of cyber physical systems

Sabaliauskaite, G. & Mathur, A. P., 22 Sep 2014, Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

2 Citations (Scopus)

Detecting injection attacks in linear time invariant systems

Loh, P., Sabaliauskaite, G. & Mathur, A., 3 Mar 2014, Proceedings of the 2013 IEEE Conference on Cybernetics and Intelligent Systems, CIS 2013. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

2 Citations (Scopus)
2013

Intelligent checkers to improve attack detection in cyber physical systems

Sabaliauskaite, G. & Mathur, A. P., 19 Dec 2013, Proceedings - 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

12 Citations (Scopus)
2010

Challenges in aligning requirements engineering and verification in a large-scale industrial context

Sabaliauskaite, G., Loconsole, A., Engström, E., Unterkalmsteiner, M., Regnell, B., Runeson, P., Gorschek, T. & Feldt, R., 2010, Requirements Engineering: Foundation for Software Quality. Springer, Cham , p. 128-142 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

23 Citations (Scopus)
2004

Assessing defect detection performance of interacting teams in object-oriented design inspection

Sabaliauskaite, G., Kusumoto, S. & Inoue, K., Oct 2004, In : Information and Software Technology. 46, 13, p. 875-886 12 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Comparing reading techniques for object-oriented design inspection

Sabaliauskaite, G., Kusumoto, S. & Inoue, K., Jan 2004, In : IEICE Transactions on Information and Systems.

Research output: Contribution to journalArticle

2003

An experimental comparison of checklist-based reading and perspective-based reading for UML design document inspection

Sabaliauskaite, G., Matsukawa, F., Kusumoto, S. & Inoue, K., 22 Jan 2003, Proceedings 2002 International Symposium on Empirical Software Engineering. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

20 Citations (Scopus)

Further investigations of reading techniques for object-oriented design inspection

Sabaliauskaite, G., Matsukawa, F., Kusumoto, S. & Inoue, K., 15 Jun 2003, In : Information and Software Technology. 45, 9, p. 571-585 15 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2002

Extended Metrics to Evaluate Cost Effectiveness of Software Inspections

Sabaliauskaite, G., Kusumoto, S. & Inoue, K., Jan 2002, In : IEICE Transactions on Information and Systems. E84, 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)