Attacks on Self-Driving Cars and Their Countermeasures: A Survey
暂无分享,去创建一个
Joarder Kamruzzaman | Gour Karmakar | Rajkumar Das | Alireza Jolfaei | Abdullahi Chowdhury | A. Jolfaei | G. Karmakar | J. Kamruzzaman | R. Das | Abdullahi Chowdhury
[1] Di Ma,et al. A Functional Co-Design towards Safe and Secure Vehicle Platooning , 2017, CPSS@AsiaCCS.
[2] Alastair R. Ruddle,et al. Towards a systematic security evaluation of the automotive Bluetooth interface , 2017, Veh. Commun..
[3] Stefania Santini,et al. A Secure Adaptive Control for Cooperative Driving of Autonomous Connected Vehicles in the Presence of Heterogeneous Communication Delays and Cyberattacks , 2020, IEEE Transactions on Cybernetics.
[4] Tomasz Kryjak,et al. Real-time hardware–software embedded vision system for ITS smart camera implemented in Zynq SoC , 2018, Journal of Real-Time Image Processing.
[5] T. Humphreys,et al. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .
[6] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[7] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[8] Jianfeng Ma,et al. Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles , 2020, IEEE Transactions on Vehicular Technology.
[9] Monika Jain,et al. VANET: Security Attacks, Solution and Simulation , 2018 .
[10] Yilin Zhao. Telematics: Safe and Fun Driving , 2002, IEEE Intell. Syst..
[11] Netina Tan. Electoral Management of Digital Campaigns and Disinformation in East and Southeast Asia , 2020, Election Law Journal: Rules, Politics, and Policy.
[12] Christof Paar,et al. Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects , 2008, Sicherheit.
[13] Jianfeng Ma,et al. A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs , 2017, IEEE Access.
[14] Junaid Qadir,et al. Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.
[15] Alexander Paz,et al. Mapping Two Decades of Autonomous Vehicle Research: A Systematic Scientometric Analysis , 2020, Journal of Urban Technology.
[16] Andrei Costin,et al. Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations , 2016, TrustED@CCS.
[17] Deptt,et al. A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network , 2017 .
[18] Riccardo M. G. Ferrari,et al. A Sliding Mode Observer Approach for Attack Detection and Estimation in Autonomous Vehicle Platoons using Event Triggered Communication , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).
[19] Jian Shen,et al. Secure intelligent traffic light control using fog computing , 2018, Future Gener. Comput. Syst..
[20] Masud Rana,et al. IoT-Based Electric Vehicle State Estimation and Control Algorithms Under Cyber Attacks , 2020, IEEE Internet of Things Journal.
[21] Eric Armengaud,et al. A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context , 2016, SAFECOMP.
[22] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[23] Cristina Nita-Rotaru,et al. Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars , 2018, WISEC.
[24] A. Boukerche,et al. Data Communication in VANETs: A Survey, Challenges and Applications , 2014 .
[25] Shaojing Li,et al. Invulnerability analysis in intelligent transportation system , 2017, Int. J. High Perform. Syst. Archit..
[26] Margarida C. Coelho,et al. Driving Information in a Transition to a Connected and Autonomous Vehicle Environment: Impacts on Pollutants, Noise and Safety , 2020, Transportation Research Procedia.
[27] Alon Gany,et al. On-board hydrogen production for auxiliary power in passenger aircraft , 2017 .
[28] Araz Taeihagh,et al. Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks , 2018, Transport Reviews.
[29] András Kovács,et al. Enhancements of V2X communication in support of cooperative autonomous driving , 2015, IEEE Communications Magazine.
[30] Tao Zhang,et al. Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.
[31] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.
[32] Yuval Elovici,et al. Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems , 2020, IACR Cryptol. ePrint Arch..
[33] Yang Liu,et al. Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System , 2018, Sensors.
[34] Feng Lyu,et al. Vehicular Communication Networks in the Automated Driving Era , 2018, IEEE Communications Magazine.
[35] Sherali Zeadally,et al. Autonomous Cars: Research Results, Issues, and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[36] James Evans. Governing Cities for Sustainability: A Research Agenda and Invitation , 2019, Front. Sustain. Cities.
[37] James H. Lambert,et al. Understanding and managing disaster evacuation on a transportation network. , 2013, Accident; analysis and prevention.
[38] Antti Hakkala,et al. Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service? , 2019, IntelliSys.
[39] Flavio D. Garcia,et al. Dismantling iClass and iClass Elite , 2012, ESORICS.
[40] Rafi Ud Daula Refat,et al. Improving CAN bus security by assigning dynamic arbitration IDs , 2020 .
[41] Manimaran Govindarasu,et al. Detection of Injection Attacks in In-Vehicle Networks , 2019 .
[42] Elyes Ben Hamida,et al. On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.
[43] Yong Yin,et al. Perceptual control architecture for cyber-physical systems in traffic incident management , 2012, J. Syst. Archit..
[44] Chan Yeob Yeun,et al. Autonomous Vehicle Security: Conceptual Model , 2019, 2019 IEEE Transportation Electrification Conference and Expo, Asia-Pacific (ITEC Asia-Pacific).
[45] Homayoun Najjaran,et al. Deep Learning Sensor Fusion for Autonomous Vehicle Perception and Localization: A Review , 2020, Sensors.
[46] Antonio Alfredo Ferreira Loureiro,et al. Intelligent Transport System in Smart Cities , 2018, Urban Computing.
[47] Mayank Dave,et al. Secure and efficient key delivery in VANET using cloud and fog computing , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).
[48] Maode Ma,et al. A cross-domain group authentication scheme for LTE-A based vehicular network , 2017, 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).
[49] Choong Seon Hong,et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..
[50] Neeraj Kumar,et al. Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review , 2020, Comput. Electr. Eng..
[51] Florian Sommer,et al. Survey and Classification of Automotive Security Attacks , 2019, Inf..
[52] David Elliott,et al. Recent advances in connected and automated vehicles , 2019, Journal of Traffic and Transportation Engineering (English Edition).
[53] Catherine M. Burns,et al. Autonomous Driving in the Real World: Experiences with Tesla Autopilot and Summon , 2016, AutomotiveUI.
[54] Joarder Kamruzzaman,et al. Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone , 2020, J. Netw. Comput. Appl..
[55] T. Humphreys. STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .
[56] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[57] Joarder Kamruzzaman,et al. Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.
[58] Matthew Johnson-Roberson,et al. Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking , 2020, 2020 IEEE Conference on Control Technology and Applications (CCTA).
[59] M. Wolf,et al. W ANNA D RIVE ? Feasible Attack Paths and Effective Protection Against Ransomware in Modern Vehicles , 2017 .
[60] Nadra Guizani,et al. Autonomous Driving Cars in Smart Cities: Recent Advances, Requirements, and Challenges , 2020, IEEE Network.
[61] Liam Paull,et al. Autonomous Vehicle Navigation in Rural Environments Without Detailed Prior Maps , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).
[62] Mourad Elhadef,et al. Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review , 2018, MUE/FutureTech.
[63] A. A. Syed,et al. Classification of Security Attacks in VANET: A Review of Requirements and Perspectives , 2018 .
[64] Sevil Sen,et al. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.
[65] Hyunbum Kim,et al. Detecting Location Spoofing using ADAS sensors in VANETs , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[66] Manu Bansal,et al. A review on VANET security attacks and their countermeasure , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[67] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[68] Keyvan Ansari,et al. Cloud Computing on Cooperative Cars (C4S): An Architecture to Support Navigation-as-a-Service , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).
[69] Aneta Poniszewska-Marańda,et al. Security solution methods in the Vehicular Ad-Hoc Networks , 2019, MoMM.
[70] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[71] William B. Rouse. The Systems, Man, and Cybernetics of Driverless Cars: Challenges and Opportunities for the SMCS , 2017, IEEE Systems, Man, and Cybernetics Magazine.
[72] Mohamed Baza,et al. Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.
[73] Padmalaya Nayak,et al. A review on DoS attack for WSN: Defense and detection mechanisms , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[74] Babu Sena Paul,et al. Performance analysis of hybrid WiMAX/DSRC scenarios for vehicular communication environment , 2017 .
[75] Madeline Cheah,et al. Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus , 2019, CSCS.
[76] Hafiz Malik,et al. LiDAR Data Integrity Verification for Autonomous Vehicle , 2019, IEEE Access.
[77] Sanjay E. Sarma,et al. A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.
[78] Weihua Zhuang,et al. Infotainment and road safety service support in vehicular networking: From a communication perspective , 2011 .
[79] G. Abdella,et al. Disaster management in industrial areas: Perspectives, challenges and future research , 2019, Journal of Industrial Engineering and Management.
[80] Bas G.B. Stottelaar,et al. Practical cyber-attacks on autonomous vehicles , 2015 .
[81] Gongjun Yan,et al. Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.
[82] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[83] Karuna Babber,et al. Cross-Layer Designs in Wireless Sensor Networks , 2019 .
[84] Shabbir Ahmed,et al. Detecting Attacks Against Safety-Critical ADAS Based on In-Vehicle Network Message Patterns , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track.
[85] Kun Jiang,et al. An Overview of Attacks and Defences on Intelligent Connected Vehicles , 2019, ArXiv.
[86] Philipp Wintersberger,et al. Text Comprehension: Heads-Up vs. Auditory Displays: Implications for a Productive Work Environment in SAE Level 3 Automated Vehicles , 2019, AutomotiveUI.
[87] Yiheng Feng,et al. Safety assessment of highly automated driving systems in test tracks: A new framework. , 2020, Accident; analysis and prevention.
[88] Jamal Raiyn,et al. Data and Cyber Security in Autonomous Vehicle Networks , 2018, Transport and Telecommunication Journal.
[89] Andrei Vladyko,et al. Forecasting Issues of Wireless Communication Networks' Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks , 2019, Inf..
[90] Maurice Schellekens. Car hacking: Navigating the regulatory landscape , 2016, Comput. Law Secur. Rev..
[91] Haowen Tan,et al. Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks” , 2018, IEEE Transactions on Intelligent Transportation Systems.
[92] Abobakr Y. Shahrah,et al. Adaptive Case Management Framework to Develop Case-based Emergency Response System , 2017 .
[93] Xingkang He,et al. Secure Platooning of Autonomous Vehicles Under Attacked GPS Data , 2020, ArXiv.
[94] Priyanka Soni,et al. Sybil Node Detection and Prevention Approach on Physical Location in VANET , 2015 .
[95] Bharadwaj Satchidanandan,et al. Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems , 2019, ACM Trans. Cyber Phys. Syst..
[96] Azeem Hafeez,et al. ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks , 2019, 2019 15th International Computer Engineering Conference (ICENCO).
[97] Jin Cui,et al. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.
[98] Kaiqi Xiong,et al. A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles , 2020, Comput. Secur..
[99] Mordechai Guri,et al. aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR) , 2017, Comput. Secur..
[101] Ning Lu,et al. Soft-defined heterogeneous vehicular network: architecture and challenges , 2015, IEEE Network.
[102] Mashrur Chowdhury,et al. Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention , 2017, ArXiv.
[103] Anuj K. Pradhan,et al. Literature Review of Behavioral Adaptations to Advanced Driver Assistance Systems , 2016 .
[104] Nik Thompson,et al. Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand , 2020, Gov. Inf. Q..
[105] Xinyu Yang,et al. Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.
[106] Roberto Cipolla,et al. MultiNet: Real-time Joint Semantic Reasoning for Autonomous Driving , 2016, 2018 IEEE Intelligent Vehicles Symposium (IV).
[107] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[108] Khaled M. Elleithy,et al. Real-Time Detection of DoS Attacks in IEEE 802.11p Using Fog Computing for a Secure Intelligent Vehicular Network , 2019 .
[109] Ismail Ahmedy,et al. A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks , 2018, Wirel. Commun. Mob. Comput..
[110] Hyunho Chang,et al. System architecture of a decision support system for freeway incident management in Republic of Korea , 2008 .
[111] Suresh Sankaranarayanan,et al. Traffic Data Classification for Security in IoT-Based Road Signaling System , 2019 .
[112] Syed Hassan Ahmed,et al. Named-Data-Networking-Based ITS for Smart Cities , 2017, IEEE Communications Magazine.
[113] Selo Sulistyo,et al. Review of Potential Methods for Handover Decision in V2V VANET , 2019, 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE).
[114] Andrew Walenstein,et al. A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).
[115] Mahamod Ismail,et al. Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..
[116] Danwei Wang,et al. Secure Pose Estimation for Autonomous Vehicles under Cyber Attacks , 2019, 2019 IEEE Intelligent Vehicles Symposium (IV).
[117] Michael Sivak,et al. A Survey of Public Opinion about Autonomous and Self-Driving Vehicles in the U.S., the U.K., and Australia , 2014 .
[118] Flavio D. Garcia,et al. Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.
[119] Barbara M. Masini,et al. On the Performance of IEEE 802.11p and LTE-V2V for the Cooperative Awareness of Connected Vehicles , 2017, IEEE Transactions on Vehicular Technology.
[120] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[121] Wathiq Mansoor,et al. A survey on context-aware vehicular network applications , 2016, Veh. Commun..
[122] Rafia Inam,et al. Concerns on the Differences Between AI and System Safety Mindsets Impacting Autonomous Vehicles Safety , 2018, SAFECOMP Workshops.
[123] Mario Hirz,et al. Sensor and object recognition technologies for self-driving cars , 2017 .
[124] Elyes Ben Hamida,et al. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice , 2016, Sensors.
[125] Julio Cesar Sampaio do Prado Leite,et al. Software Transparency as a Key Requirement for Self-Driving Cars , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).
[126] Keechoo Choi,et al. A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment , 2012, IEEE Transactions on Intelligent Transportation Systems.
[127] H. Raghav Rao,et al. Efficiency of critical incident management systems: Instrument development and validation , 2007, Decis. Support Syst..
[128] Abdullahi Chowdhury. Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview , 2016, ATIS.
[129] Nanhay Singh,et al. SECURITY CHALLENGES , ISSUES AND THEIR SOLUTIONS FOR VANET , 2013 .
[130] David G. Kidd,et al. Rage against the machine? Google's self-driving cars versus human drivers. , 2017, Journal of safety research.
[131] James Gross,et al. Experimental Characterization and Modeling of RF Jamming Attacks on VANETs , 2015, IEEE Transactions on Vehicular Technology.
[132] Xue Liu,et al. Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.
[133] Kevin Fu,et al. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.
[134] Haibin Zhang,et al. When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions , 2017, IEEE Wireless Communications.
[135] Woongsun Jeon,et al. Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles , 2021, IEEE Sensors Journal.
[136] Erik M. Fredericks,et al. Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[137] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[138] Araz Taeihagh,et al. Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications , 2018, ArXiv.
[139] Soodeh Dadras,et al. Cybersecurity of Autonomous Vehicle Platooning , 2017 .
[140] Mawloud Omar,et al. Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks , 2019, 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[141] Abdulrahman Alarifi,et al. Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[142] Shrikant S. Tangade,et al. A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[143] Paola Salomoni,et al. A Service-Oriented Approach to Crowdsensing for Accessible Smart Mobility Scenarios , 2016, Mob. Inf. Syst..
[144] Walid Saad,et al. Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning , 2018, IEEE Transactions on Communications.
[145] Todd E. Humphreys,et al. Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals , 2013 .
[146] Joarder Kamruzzaman,et al. Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System , 2018, ICICS.
[147] Ismail Güvenç,et al. UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges , 2017, IEEE Communications Magazine.
[148] Bruno Sinopoli,et al. Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.
[149] Lei Wang,et al. Trajectory tracking and recovery attacks in VANET systems , 2018, Int. J. Commun. Syst..
[150] Panagiotis Papadimitratos,et al. SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.
[151] Yonggui Liu,et al. Resilient Control Design of the Third-Order Discrete-Time Connected Vehicle Systems Against Cyber-Attacks , 2020, IEEE Access.
[152] S. Rhee,et al. Current status and perspectives on recycling of end-of-life battery of electric vehicle in Korea (Republic of). , 2020, Waste management.
[153] Chih-Wei Pai,et al. Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research , 2019, Front. Psychol..
[154] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[155] Martin Mullins,et al. Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.
[156] Sharanjit Singh,et al. Overview of Various Attacks in VANET , 2015 .
[157] Yong Tang,et al. Vehicle detection and recognition for intelligent traffic surveillance system , 2017, Multimedia Tools and Applications.
[158] Takafumi Asao,et al. Safety Evaluation of Advanced Driver Assistance Systems as Human-machine Systems , 2017 .
[159] James T. Curran,et al. On the use of Low-Cost IMUs for GNSS Spoofing Detection in Vehicular Applications , 2017 .
[160] Lei Guo,et al. SDN-Enabled Social-Aware Clustering in 5G-VANET Systems , 2018, IEEE Access.
[161] Yi-Chang Chiu,et al. A Sequential Decomposition Framework and Method for Calibrating Dynamic Origin—Destination Demand in a Congested Network , 2017, IEEE Transactions on Intelligent Transportation Systems.
[162] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[163] Zuriati Zukarnain,et al. Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks , 2018, Int. J. Netw. Virtual Organisations.
[164] A. Nikitas,et al. Examining the myths of connected and autonomous vehicles: analysing the pathway to a driverless mobility paradigm , 2019, International Journal of Automotive Technology and Management.
[165] Todd E. Humphreys,et al. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..
[166] Andrei G. Vladyko,et al. VANET/ITS cybersecurity threats: Analysis, categorization and forecasting , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).