Impact of Factors Influencing Cyber Threats on Autonomous Vehicles
暂无分享,去创建一个
A. S. Saravanan | Nitin Patwa | A. Seetharaman | Veena Jadhav | Dhivya Sangeeth | Nitin Patwa | A. Seetharaman | Veena Jadhav | Dhivya Sangeeth
[1] A. Bryman,et al. The Sage Encyclopedia of Social Science Research Methods (three volumes) , 2003 .
[2] Peter Jones,et al. Social and behavioural questions associated with automated vehicles: a literature review , 2017 .
[3] Dorothy J. Glancy. Autonomous and Automated and Connected Cars—Oh My! First Generation Autonomous Cars in the Legal Ecosystem , 2015 .
[4] ChristinDelphine. Privacy in mobile participatory sensing , 2016 .
[5] Barbara Lenz,et al. Transition pathways to fully automated driving and its implications for the sociotechnical system of automobility , 2015 .
[6] Sevil Sen,et al. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.
[7] E. Bullmore,et al. How Good Is Good Enough in Path Analysis of fMRI Data? , 2000, NeuroImage.
[8] Milan N. Simic,et al. Vehicular Ad Hoc Networks , 2013, 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS).
[9] Edwin Olson,et al. Multipolicy decision-making for autonomous driving via changepoint-based behavior prediction: Theory and experiment , 2015, Autonomous Robots.
[10] Milan Simic,et al. In the Passenger Seat: Investigating Ride Comfort Measures in Autonomous Cars , 2015, IEEE Intelligent Transportation Systems Magazine.
[11] Ciprian Dobre,et al. Privacy-preserving data aggregation in Intelligent Transportation Systems , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[12] Pan Zhao,et al. A Scenario-Adaptive Driving Behavior Prediction Approach to Urban Autonomous Driving , 2017 .
[13] Andreas Theodorou,et al. Robot transparency, trust and utility , 2016, Connect. Sci..
[14] Rong Qu,et al. Survey on cyber security of CAV , 2017, 2017 Forum on Cooperative Positioning and Service (CPGPS).
[15] B. Taylor,et al. A private matter: the implications of privacy regulations for intelligent transportation systems , 2016 .
[16] Nidhi Kalra,et al. Liability and Regulation of Autonomous Vehicle Technologies , 2009 .
[17] Frank W. Geels,et al. The dynamics of transitions in socio-technical systems: A multi-level analysis of the transition pathway from horse-drawn carriages to automobiles (1860–1930) , 2005, Technol. Anal. Strateg. Manag..
[18] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.
[19] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[20] Iyad Rahwan,et al. The social dilemma of autonomous vehicles , 2015, Science.
[21] Elyes Ben Hamida,et al. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .
[22] Delphine Christin,et al. Privacy in mobile participatory sensing , 2016 .
[23] Dipak Ghosal,et al. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.
[24] Andrew P. Martin,et al. Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[25] Madjid Tavana,et al. Autonomous vehicles: challenges, opportunities, and future implications for transportation policies , 2016, Journal of Modern Transportation.
[26] Kathrin Zeeb,et al. What determines the take-over time? An integrated model approach of driver take-over after automated driving. , 2015, Accident; analysis and prevention.
[27] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[28] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[29] Yili Liu,et al. Queuing Network Modeling of Driver Workload and Performance , 2006, IEEE Transactions on Intelligent Transportation Systems.
[30] Robert E. Llaneras,et al. Distracted Driver Performance to Multiple Alerts in a Multiple-Conflict Scenario , 2014, Hum. Factors.
[31] Suleyman Uludag,et al. Intelligent transportation as the key enabler of smart cities , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[32] Daniel A. Crane,et al. A Survey of Legal Issues Arising from the Deployment of Autonomous and Connected Vehicles , 2016 .
[33] Kevin D. Carlson,et al. Understanding the Impact of Convergent Validity on Research Results , 2012 .
[34] Jessica S. Brodsky. Autonomous Vehicle Regulation: How an Uncertain Legal Landscape May Hit The Brakes on Self-Driving Cars , 2016 .
[35] John D. Villasenor. Products Liability and Driverless Cars: Issues and Guiding Principles for Legislation , 2014 .
[36] Caleb Kennedy. New Threats to Vehicle Safety: How Cybersecurity Policy Will Shape the Future of Autonomous Vehicles , 2017 .
[37] K. Jöreskog,et al. A General Method of Estimating the Reliability of a Composite , 1978 .
[38] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[39] Robert D. McLeod,et al. Bluetooth in Intelligent Transportation Systems: A Survey , 2015, Int. J. Intell. Transp. Syst. Res..
[40] A. Shariff,et al. Psychological roadblocks to the adoption of self-driving vehicles , 2017, Nature Human Behaviour.
[41] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .