Autonomous vehicle: Security by design
A Chattopadhyay, KY Lam… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security of (semi)-autonomous vehicles is a growing concern, first, due to the increased
exposure of the functionality to potential attackers; second, due to the reliance of …
exposure of the functionality to potential attackers; second, due to the reliance of …
[HTML][HTML] Security in intelligent transport systems for smart cities: From theory to practice
MA Javed, E Ben Hamida, W Znaidi - Sensors, 2016 - mdpi.com
Connecting vehicles securely and reliably is pivotal to the implementation of next generation
ITS applications of smart cities. With continuously growing security threats, vehicles could be …
ITS applications of smart cities. With continuously growing security threats, vehicles could be …
On the interrelation of security, QoS, and safety in cooperative ITS
Cooperative intelligent transport system (C-ITS) is an emerging technology that enables
secure and safe road travel using wireless communications. Vehicles regularly share their …
secure and safe road travel using wireless communications. Vehicles regularly share their …
Channel-aware ECDSA signature verification of basic safety messages with k-means clustering in VANETs
Vehicular ad hoc network facilitates cooperative awareness applications by periodically
sharing basic safety messages (BSMs) with the neighborhood vehicles. As these …
sharing basic safety messages (BSMs) with the neighborhood vehicles. As these …
Safety & security in the context of autonomous driving
M Koschuch, W Sebron, Z Szalay… - … Vehicles and Expo …, 2019 - ieeexplore.ieee.org
With the advent of cypher-physical (systems of) systems, new challenges for safety and
security arise. Especially in the context of autonomous driving we are currently facing a …
security arise. Especially in the context of autonomous driving we are currently facing a …
Goal-oriented co-engineering of security and safety requirements in cyber-physical systems
C Ponsard, G Dallons, P Massonet - International Conference on …, 2016 - Springer
Many safety critical systems are integrating more and more software based systems and are
becoming increasingly connected. Such Cyber-Physical Systems require high assurance …
becoming increasingly connected. Such Cyber-Physical Systems require high assurance …
Incorporating attacker capabilities in risk estimation and mitigation
The risk exposure of a given threat to an information system is a function of the likelihood of
the threat and the severity of its impacts. Existing methods for estimating threat likelihood …
the threat and the severity of its impacts. Existing methods for estimating threat likelihood …
Towards a security architecture for protecting connected vehicles from malware
Vehicles are becoming increasingly connected to the outside world. We can connect our
devices to the vehicle's infotainment system and internet is being added as a functionality …
devices to the vehicle's infotainment system and internet is being added as a functionality …
New aspects of integrity levels in automotive industry-cybersecurity of automated vehicles
The spread of connected vehicles is expected to multiply the effects of the growing
penetration of cyberspace in our life, and with this it remarkably influences the vulnerability …
penetration of cyberspace in our life, and with this it remarkably influences the vulnerability …
Systems and methods for detecting anomalies that are potentially indicative of malicious attacks
W Bogorad - US Patent 10,104,100, 2018 - Google Patents
A computer-implemented method for detecting anomalies that are potentially indicative of
malicious attacks may include (1) identifying a sequence of activities performed on a …
malicious attacks may include (1) identifying a sequence of activities performed on a …