Autonomous Vehicles' Forensics in Smart Cities
暂无分享,去创建一个
[1] Nhien-An Le-Khac,et al. Internet of Things Forensics - Challenges and a Case Study , 2018, IFIP Int. Conf. Digital Forensics.
[2] Panayotis Kikiras,et al. Live forensics framework for wireless sensor nodes using sandboxing , 2010, Q2SWinet '10.
[3] Giancarmine Fasano,et al. Sense and avoid for unmanned aircraft systems , 2016, IEEE Aerospace and Electronic Systems Magazine.
[4] Nidhi Kalra,et al. Autonomous Vehicle Technology: A Guide for Policymakers , 2014 .
[5] Lei Chen,et al. Emerging cyberworld attack vectors: Modification, customization, secretive communications, and digital forensics in PC video games , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[6] Depeng Li,et al. A solution based analysis of attack vectors on smart home systems , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[7] Tang You-wen,et al. The fuzzy analytic hierarchy process , 2002 .
[8] Qiang Shen,et al. Adaptive Fuzzy Interpolation , 2011, IEEE Transactions on Fuzzy Systems.
[9] M. S. Kumbhar,et al. Urban Resources for Smart City Application , 2016 .
[10] Fei Chao,et al. Generalized Adaptive Fuzzy Rule Interpolation , 2017, IEEE Transactions on Fuzzy Systems.
[11] Xiaohua Feng,et al. Security and Forensics Challenges to The MK Smart Project , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[12] Saad Amin,et al. A New Digital Forensics Model of Smart City Automated Vehicles , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[13] P. O'Shea,et al. Demonstration of closed-loop airborne sense-and-avoid using machine vision , 2012, IEEE Aerospace and Electronic Systems Magazine.
[14] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[15] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[16] Konstantinos Markantonakis,et al. Log Your Car: The Non-invasive Vehicle Forensics , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.