IT security challenges for continuously connected near-autonomous vehicles
暂无分享,去创建一个
[1] Frederick J. Gravetter,et al. Essentials of Statistics for the Behavioral Sciences , 1991 .
[2] Péter Gáspár,et al. Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).
[3] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[4] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[5] M. Sheelagh T. Carpendale,et al. Analyzing Qualitative Data , 2017, ISS.
[6] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[7] Christoph Schmittner,et al. The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles , 2016 .
[8] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[9] Karl Henrik Johansson,et al. Vehicle Applications of Controller Area Network , 2005, Handbook of Networked and Embedded Control Systems.
[10] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[11] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).