Bakhtina et al., 2021 - Google Patents
Information security analysis in the passenger-autonomous vehicle interactionBakhtina et al., 2021
View PDF- Document ID
- 6021410872570507913
- Author
- Bakhtina M
- Matulevicius R
- Publication year
- Publication venue
- Proceedings of the 16th International Conference on Availability, Reliability and Security
External Links
Snippet
Autonomous vehicles (AV) are becoming a part of humans' everyday life. There are numerous pilot projects of driverless public buses; some car manufacturers deliver their premium-level automobiles with advanced self-driving features. Thus, assuring the security …
- 230000003993 interaction 0 title abstract description 48
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shore et al. | Zero trust: the what, how, why, and when | |
| Borky et al. | Protecting information with cybersecurity | |
| Fernandez-Buglioni | Security patterns in practice: designing secure architectures using software patterns | |
| Bakhtina et al. | Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction. | |
| Almarhabi et al. | Security management of BYOD and cloud environment in Saudi Arabia | |
| Rawal et al. | Cybersecurity and identity access management | |
| Bakhtina et al. | Information security analysis in the passenger-autonomous vehicle interaction | |
| Konieczny et al. | SEADE: Countering the futility of network security | |
| Wei et al. | A system theoretic approach to cybersecurity risk analysis and mitigation for autonomous passenger vehicles | |
| Bailey | Self-adaptive Authorisation Infrastructures | |
| Neisse et al. | Improving internet of things device certification with policy-based management | |
| Püllen et al. | ISO/SAE 21434-based risk assessment of security incidents in automated road vehicles | |
| Ahmed et al. | Presentation and validation of method for security requirements elicitation from business processes | |
| Püllen et al. | Safety meets security: Using IEC 62443 for a highly automated road vehicle | |
| Narayana | Security analysis of web application for industrial internet of things | |
| Malm et al. | Comparison of cybersecurity and functional safety risk assessments | |
| Haber et al. | Privileged Access Management (PAM) | |
| Kim et al. | Security threat analysis for remote monitoring and control functions of connected car services | |
| Diogenes et al. | Microsoft defender for cloud | |
| Bodeau et al. | Cyber Resiliency Metrics and Scoring in Practice | |
| Polanco | Enabling a Multi-Pronged Socio-technical Approach to Address Automotive Cybersecurity | |
| Hanic et al. | An Attack Model of Autonomous Systems of Systems | |
| Krause et al. | Cybersecurity and Intelligent Transportation Systems: Best Practice Guide | |
| Rosén | Achieving Zero Trust: A Strategic Roadmap for Phased Implementation of Zero Trust Architecture | |
| Liedtke | Risk Assessment |