*Result*: Attack Chains Construction for Vehicular Networks Based on a Two‐Dimensional Vulnerability Combination Strategy.
*Further Information*
*Vehicular networks are central to intelligent transportation systems, yet their expanding attack surface yields complex multivulnerability paths that exceed traditional detection capabilities. This article presents a high‐coverage attack‐chain generation framework that models, clusters, and composes vulnerabilities with reduced redundancy. A five‐tuple schema, Conditions, Tech, Tool, Target, and Results, unifies heterogeneous sources to expose underlying correlations. A semantically enhanced K‐Modes method integrates semantic similarity with Hamming distance to improve categorization. A two‐dimensional combinatorial engine then generates attack paths using a coverage matrix and greedy selection to balance tractability and coverage. Experiments on communication, system, and control‐layer vulnerabilities achieve over 70% coverage and 85% accuracy, outperforming baselines. The framework supports vulnerability assessment and proactive defense planning, strengthening vehicular network resilience against complex attack chains. [ABSTRACT FROM AUTHOR]
Copyright of International Journal of Communication Systems is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)*