Proceedings of International Scientific Conference „ALFATECH – Smart Cities and modern technologies“ (pp. 90-95)
АУТОР(И) / AUTHOR(S): Čaba VARŠANDAN
, Milica VARŠANDAN
Download Full Pdf 
DOI: 10.46793/ALFATECHproc25.090V
САЖЕТАК / ABSTRACT:
Public data in smart cities is frequently targeted by malware. Protecting such data represents a serious threat, as basic security services, individuals, and the functionality of the system itself are at risk. Malware attacks are a growing threat due to the complex technologies used. Open data is utilized to improve the management of urban systems and increase efficiency. With the help of advanced technologies such as artificial intelligence, encryption, blockchain, and security measures, smart cities can enhance system protection and reduce the risk of attacks. This paper analyzes public data in smart cities, the types of attacks on public data, and how malware attacks affect it.
КЉУЧНЕ РЕЧИ / KEYWORDS:
malicious software, open/public data, attacks, smart cities
ПРОЈЕКАТ / ACKNOWLEDGEMENT:
ЛИТЕРАТУРА / REFERENCES:
- Pier Luigi Mazzeo, Paolo Spagnolo (2024) Smart Cities – Foundations and Perspectives. Open access peer-reviewed Edited Volume. doi: 10.5772/intechopen.114510
- Laura Puttkamer (2023) City Portrait: Smart City Copenhagen https://www.beesmart.city/en/smart-city-blog/copenhagen
- Jehad Ali, Sushil Kumar Singh, Weiwei Jiang, Abdulmajeed M. Alenezi, Muhammad Islam, Yousef Ibrahim Daradkeh, Asif Mehmood (2025) A deep dive into cybersecurity solutions for AI-driven IoTenabled smart cities in advanced communication networks. Computer Communications, Volume 229, 1 January 2025. doi: https://doi.org/10.1016/j.comcom.2024.108000
- State of Green partnership authors (2023) 10 examples of smart city solutions. https://stateofgreen.com/en/news/10-examples-of-smart-city-solutions/
- Rambus company members (2023) Smart Cities: Threat and Countermeasures. https://www.rambus.com/iot/smart-cities/
- Microsoft knowledge base (2025) What is malware? https://www.microsoft.com/en-us/security/business/security-101/whatis-malware
- Josh Fruhlinger, John Leyden (2024) 15 infamous malware attacks: The first and the worst https://www.csoonline.com/article/572911/11-infamous-malwareattacks-the-first-and-the-worst.html
- AI Edge Labs (2022) Cybersecurity Best Practices in Smart Cities https://edgelabs.ai/blog/cybersecurity-in-smart-cities-risks-andprotection-best-practices/
- Kurt Baker, Crowdstrike (2023) The 12 most common types of malwares https://www.crowdstrike.com/en-us/cybersecurity-101/malware/typesof-malware/
- Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam (2023) Malware Resistant Data Protection in Hyperconnected Networks: A survey. doi: 10.48550/arXiv.2307.13164
- Microsoft knowledge base (2025) What is cybersecurity? https://www.microsoft.com/en/security/business/security-101/what-iscybersecurity
- Michael Buckbee (2023) What is an Advanced Persistent Threat (APT)? https://www.varonis.com/blog/advanced-persistent-threat
- Wiem Tounsi, Helmi Rais (2018) A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & Security, Volume 72, Pages 212-233 doi: 10.1016/J.COSE.2017.09.001
- James B. Fraley and Marco Figueroa, “Polymorphic malware detection using topological feature extraction with data mining,” Conf.Proc. – IEEE SOUTHEASTCON, vol. 2016. doi: 10.1109/SECON.2016.7506685
- Trellix company members, What Is Fileless Malware? https://www.trellix.com/security-awareness/ransomware/what-isfileless-malware/
- Umesh Kumar Singh, Chanchala Joshi, Dimitris Kanellopoulos (2019) A framework for zero-day vulnerabilities detection and prioritization. Journal of Information Security and Applications Volume 46, Pages 164-172 doi: https://doi.org/10.1016/j.jisa.2019.03.011
- Abeer Iftikhar, Kashif Naseer Qureshi, Muhammad Shiraz, Saleh Albahli (2023) Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review. Journal of King Saud University – Computer and Information Sciences, Volume 35, Issue 9 doi: https://doi.org/10.1016/j.jksuci.2023.101788
- Blessing Onyegbula, Muhammad Raza (2024) What is Malware Detection? https://www.splunk.com/en_us/blog/learn/malware-detection.html
- Samuel Gibbs (2016) Ransomware attack on San Francisco public transit gives everyone a free ride https://www.theguardian.com/technology/2016/nov/28/passengers-freeride-san-francisco-muni-ransomeware
- Daniela Popescul, Laura-Diana Radu (2016) Data Security in Smart Cities: Challenges and Solutions. Informatica Economică vol. 20, no. 1/2016 doi: http://dx.doi.org/10.12948/issn14531305/20.1.2016.03
- Victor Poitevin (2024) Overview of cyberattacks on connected cities https://www.stormshield.com/news/overview-of-cyberattacks-onconnected-cities/