Issue |
Security and Safety
Volume 2, 2023
Security and Safety in the "Metaverse"
|
|
---|---|---|
Article Number | 2023005 | |
Number of page(s) | 15 | |
Section | Information Network | |
DOI | https://doi.org/10.1051/sands/2023005 | |
Published online | 30 June 2023 |
- Yang C and Zhu L. Metaverse security: Safeguarding the integration of virtual and real worlds. Inf Commun Technol 2022; 16: 3. [Google Scholar]
- Wang H, Li Y and Li Y. Research on evolution and security risk of metaverse. Chin J Network Inf Secur 2022; 2: 8. [Google Scholar]
- Tong Z, Ye F and Yan M et al. A survey on algorithms for intelligent computing and smart city applications. Big Data Mining Anal 2021;4:155–72. [CrossRef] [Google Scholar]
- Li Z. Cloud-Network Integration: Digital Information Infrastructure in the Age of Computility. Beijing: CITIC Press, 2022. [Google Scholar]
- Lahiri U. Cybersecurity and the metaverse: Guardians of the new digital world, https://hackernoon.com/cybersecurity-and-the-metaverse-guardians-of-the-new-digital-world. [Google Scholar]
- Shen Y. Metaverse and national data security: Challenges and trends in building an ecological governance system. China Inf Secur 2022; 1: 70–2. [Google Scholar]
- Gao Y and Yang D. Addressing the metaverse challenge: A three-dimensional structural paradigm for integrated data security governance. Administration Reform. 2022; 3: 10. [Google Scholar]
- Lee L-H, Braud T and Zhou P et al. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. ArXiv preprint [arXiv:2110.05352], 2021. [Google Scholar]
- Lu J. Beware of the risks and dangers of the “metaverse fever” and promote the healthy and sustainable development of the metaverse industry. http://www.cssn.cn/zx/bwyc/202203/t20220325_5400581.shtml. [Google Scholar]
- Han S, Pu B and Li S et al. Application of block chain technology in digital asset security transaction. Comput Syst Appl 2018; 27: 5. [Google Scholar]
- Han Y. Characteristics and security challenges of non-homogenous tokens for digital ledger technology. China Inf Secur 2022; 000: 001 [Google Scholar]
- He B, Kang C and Zhang Y. Blockchain security risks and its regulatory practices. China Inf Secur 2021; 135: 43–47. [Google Scholar]
- Cao X. Research on metaverse development and security risk. China Inf Secur 2022; 151: 90–93. [Google Scholar]
- Hu F and Hei X. AI, Machine Learning and Deep Learning: A Security Perspective. CRC Press, 2023. [CrossRef] [Google Scholar]
- Gao Y, Li Y and Zhu L et al. Not all samples are born equal: Towards effective clean-label backdoor attacks. Pattern Recognit 2023; 139: 109512. [CrossRef] [Google Scholar]
- Alismail A, Altulaihan E and Rahman MMH et al. A systematic literature review on cybersecurity threats of virtual reality (vr) and augmented reality (ar). In: Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022, 761–74. [Google Scholar]
- Kroll JA, Huey J and Barocas S et al. Accountable algorithms. Univ Pennsylvania. Law Rev 2017; 165: 633–705. [Google Scholar]
- Han J, Liu Z and Lyu Q et al. Metasecurity: A framework for metaverse security based on parallel security. J Command Control 2022; 8: 3. [Google Scholar]
- Lee J, Bagheri B and Kao H-A. A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf Lett 2015; 3: 18–23. [CrossRef] [Google Scholar]
- Ross R, Pillitteri V and Graubart R et al. Developing cyber resilient systems: a systems security engineering approach. Tech. Rep., National Institute of Standards and Technology, 2019. [Google Scholar]
- Louin D, Kelly S and Krishnaswamy P et al. Tnc if-tnccs: Tlv binding version 2.0, revision 8. TCG, 2013. [Google Scholar]
- Rose S, Borchert O and Mitchell S et al. Zero trust architecture. Tech. Rep., National Institute of Standards and Technology; 2020. [Google Scholar]
- Wang Z. Application and analysis of security–chip in intelligent terminal. China Internet 2016; 08: 19–22. [Google Scholar]
- Shi W and Sun Y. The development of research on secure operating systems. Comput Sci 2002; 29: 5. [Google Scholar]
- Shi W and Sun Y. The development of research on secure operating systems. Comput Sci 2002; 29: 9. [Google Scholar]
- Rawat DB, Doku R and Garuba M. Cybersecurity in big data era: From securing big data to data-driven security. IEEE Trans Serv Comput 2019; 14: 2055–72. [Google Scholar]
- Alshamrani SS and Basha AF. Iot data security with dna-genetic algorithm using blockchain technology. Int J Comput Appl Technol 2021; 65: 150–9. [CrossRef] [Google Scholar]
- Zheng X and Cai Z. Privacy-preserved data sharing towards multiple parties in industrial iots. IEEE J Sel Areas Commun 2020; 38: 968–79. [CrossRef] [Google Scholar]
- Chen Y, Shen C and Wang Q et al. Security and privacy risks in artificial intelligence systems. J Comput Res Dev 2019; 56: 2135. [Google Scholar]
- Han J, Liu Z and Lv Q et al. Metasecurity: A framework for metaverse security based on parallel security. J Command Control 2022; 8: 249. [Google Scholar]
- Yang L, Chen S and Wang X et al. Digital twins and parallel systems: State of the art, comparisons and prospect. Acta Autom Sin 2019; 45: 2001–31. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.