[go: up one dir, main page]

Bakhtina et al., 2021 - Google Patents

Information security analysis in the passenger-autonomous vehicle interaction

Bakhtina et al., 2021

View PDF
Document ID
6021410872570507913
Author
Bakhtina M
Matulevicius R
Publication year
Publication venue
Proceedings of the 16th International Conference on Availability, Reliability and Security

External Links

Snippet

Autonomous vehicles (AV) are becoming a part of humans' everyday life. There are numerous pilot projects of driverless public buses; some car manufacturers deliver their premium-level automobiles with advanced self-driving features. Thus, assuring the security …
Continue reading at dl.acm.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Shore et al. Zero trust: the what, how, why, and when
Borky et al. Protecting information with cybersecurity
Fernandez-Buglioni Security patterns in practice: designing secure architectures using software patterns
Bakhtina et al. Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction.
Almarhabi et al. Security management of BYOD and cloud environment in Saudi Arabia
Rawal et al. Cybersecurity and identity access management
Bakhtina et al. Information security analysis in the passenger-autonomous vehicle interaction
Konieczny et al. SEADE: Countering the futility of network security
Wei et al. A system theoretic approach to cybersecurity risk analysis and mitigation for autonomous passenger vehicles
Bailey Self-adaptive Authorisation Infrastructures
Neisse et al. Improving internet of things device certification with policy-based management
Püllen et al. ISO/SAE 21434-based risk assessment of security incidents in automated road vehicles
Ahmed et al. Presentation and validation of method for security requirements elicitation from business processes
Püllen et al. Safety meets security: Using IEC 62443 for a highly automated road vehicle
Narayana Security analysis of web application for industrial internet of things
Malm et al. Comparison of cybersecurity and functional safety risk assessments
Haber et al. Privileged Access Management (PAM)
Kim et al. Security threat analysis for remote monitoring and control functions of connected car services
Diogenes et al. Microsoft defender for cloud
Bodeau et al. Cyber Resiliency Metrics and Scoring in Practice
Polanco Enabling a Multi-Pronged Socio-technical Approach to Address Automotive Cybersecurity
Hanic et al. An Attack Model of Autonomous Systems of Systems
Krause et al. Cybersecurity and Intelligent Transportation Systems: Best Practice Guide
Rosén Achieving Zero Trust: A Strategic Roadmap for Phased Implementation of Zero Trust Architecture
Liedtke Risk Assessment