Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/25370
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Odeleye, B | - |
dc.contributor.author | Loukas, G | - |
dc.contributor.author | Heartfield, R | - |
dc.contributor.author | Sakellari, G | - |
dc.contributor.author | Panaousis, E | - |
dc.contributor.author | Spyridonis, F | - |
dc.date.accessioned | 2022-10-26T08:53:55Z | - |
dc.date.available | 2022-10-26T08:53:55Z | - |
dc.date.issued | 2022-10-12 | - |
dc.identifier | ORCID iD: Blessing Odeleye https://orcid.org/0000-0002-9324-6426 | - |
dc.identifier | ORCID iD: Fotios Spyridonis https://orcid.org/0000-0003-4253-365X | - |
dc.identifier | 102951 | - |
dc.identifier.citation | Odeleye, B. et al. (2022) 'Virtually Secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments', Computers and Security, 124, 102951, pp. 1 - 17. doi: 10.1016/j.cose.2022.102951 | en_US |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/25370 | - |
dc.description.abstract | Although Virtual Reality (VR) is certainly not a new technology, its recent adoption across several sectors beyond entertainment has led the information security research community to take note of the new cyber threats that come with it. The variety of system components presents an extensive attack surface that can be exploited. At the same time, VR’s emphasis on immersion, interaction and presence means that the user can be targeted directly, yet the use of head-mounted displays may prevent them from observing a cyber attack’s impact in their immediate physical environment. This paper presents the first taxonomic representation of VR security challenges. By systemically classifying existing VR cyber threats against existing defences in a single comparative matrix, we aim to help researchers from different backgrounds to identify key focus areas where further research would be most beneficial. | - |
dc.format.extent | 1 - 17 | - |
dc.format.medium | Print-Electronic | - |
dc.language.iso | en_US | en_US |
dc.publisher | Elsevier | en_US |
dc.rights | Copyright © 2022 Elsevier Ltd. All rights reserved. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1016/j.cose.2022.102951, made available on this repository under a Creative Commons CC BY-NC-ND attribution licence (https://creativecommons.org/licenses/by-nc-nd/4.0/). | - |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | - |
dc.subject | virtual reality | en_US |
dc.subject | cyber-physical attacks | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | privacy | en_US |
dc.subject | taxonomy | en_US |
dc.title | Virtually Secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1016/j.cose.2022.102951 | - |
dc.relation.isPartOf | Computers and Security | - |
pubs.publication-status | Published | - |
pubs.volume | 124 | - |
dc.identifier.eissn | 1872-6208 | - |
dc.rights.holder | Elsevier | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2022 Elsevier Ltd. All rights reserved. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1016/j.cose.2022.102951, made available on this repository under a Creative Commons CC BY-NC-ND attribution licence (https://creativecommons.org/licenses/by-nc-nd/4.0/). | 1.81 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License