Connected cars — Threats, vulnerabilities and their impact
暂无分享,去创建一个
Silia Maksuti | Christoph Schmittner | Jerker Delsing | Markus Tauber | Stefanie Strobl | David Hofbauer
[1] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[2] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[3] Jim Harkin,et al. Case Study on the Bluetooth Vulnerabilities in Mobile Devices , 2006 .
[4] Felix C. Freiling,et al. Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .
[5] Péter Gáspár,et al. Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).
[6] G. Padmavathi,et al. Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .
[7] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[8] Dongho Won,et al. A Practical Analysis of Smartphone Security , 2011, HCI.
[9] Nuno Pereira,et al. Security vulnerabilities and risks in industrial usage of wireless communication , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).
[10] Syed Masud Mahmud,et al. Security Needs for the Future Intelligent Vehicles , 2006 .
[11] Frank Leymann,et al. The Connected Car in the Cloud: A Platform for Prototyping Telematics Services , 2015, IEEE Software.
[12] Lih Wern Wong. Potential Bluetooth Vulnerabilities in Smartphones , 2005, AISM.
[13] Thomas Peyrin,et al. Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[14] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[15] Marcus Scholler,et al. Critical services in the cloud: Understanding security and resilience risks , 2014, 2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM).