-
1
-
-
84894371128
-
-
Norwell, MA: Springer, ch. A Survey of Security and Privacy in Connected Vehicles, in press
-
L. ben Othmane, H. Weffers, M. M. Mohamad, and M. Wolf, Wireless Sensor Networks (WSN) For Vehicular and Space Applications: Architecture and Implementation. Norwell, MA: Springer, ch. A Survey of Security and Privacy in Connected Vehicles, in press.
-
Wireless Sensor Networks (WSN) for Vehicular and Space Applications: Architecture and Implementation
-
-
Ben Othmane, L.1
Weffers, H.2
Mohamad, M.M.3
Wolf, M.4
-
2
-
-
51849099145
-
-
Dec., Part 2, ch. Cellular networks
-
J. Zhang and I. Stojmenovic, Handbook on Security. Wiley, Dec. 2005, vol. Volume I, Part 2, ch. Cellular networks, pp. 654-663.
-
(2005)
Handbook on Security. Wiley
, vol.1
, pp. 654-663
-
-
Zhang, J.1
Stojmenovic, I.2
-
3
-
-
33744533643
-
In-vehicle secure wireless personal area network (swpan)
-
May
-
S. Mahmud and S. Shanker, "In-vehicle secure wireless personal area network (swpan)," IEEE Transactions on Vehicular Technology, vol. 55, no. 3, pp. 1051-1061, May 2006.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.3
, pp. 1051-1061
-
-
Mahmud, S.1
Shanker, S.2
-
4
-
-
84894358265
-
-
ISO 26262 Road vehicles-Functional safety-Part 1: Vocabulary, The International Organization for Standardization Std., November 2011, reference: ISO 26262-1:2011(E)
-
ISO 26262 Road vehicles-Functional safety-Part 1: Vocabulary, The International Organization for Standardization Std., November 2011, reference: ISO 26262-1:2011(E).
-
-
-
-
5
-
-
67649640510
-
-
National Institute of Standards and Technology Std. NIST IR 7298, Rev. 1, February
-
R. Kissel, Glossary of Key Information Security Terms, National Institute of Standards and Technology Std. NIST IR 7298, Rev. 1, February 2011. [Online]. Available: http://csrc.nist.gov/publications/ nistir/ir7298-rev1/nistir-7298- revision1.pdf
-
(2011)
Glossary of Key Information Security Terms
-
-
Kissel, R.1
-
6
-
-
84894317978
-
-
NEST Lab. (2013, March) AGORA: A versatile environment for the development of intellidrive applications
-
NEST Lab. (2013, March) AGORA: A versatile environment for the development of intellidrive applications. [Online]. Available: http://www.cs.wmich.edu/nest
-
-
-
-
7
-
-
84894349332
-
-
(2013, March) On-board diagnostics
-
(2013, March) On-board diagnostics. [Online]. Available: http: //en.wikipedia.org/wiki/On-board diagnostics
-
-
-
-
8
-
-
84894333736
-
-
(2013, March) Netbeans platform 7.3 plugin quick start
-
(2013, March) Netbeans platform 7.3 plugin quick start. [Online]. Available: http://platform.netbeans.org/tutorials/nbm-google.html
-
-
-
-
9
-
-
84894337443
-
-
(2013, March) The java tutorials
-
(2013, March) The java tutorials. [Online]. Available: http: //docs.oracle.com/javase/tutorial/reflect/index.html
-
-
-
-
10
-
-
32044443362
-
-
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Tech. Rep. Technical Note CMU/SEI-2003-TN-033, December 2003
-
D. Firesmith, "Common concepts underlying safety, security, and survivability engineering," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Tech. Rep. Technical Note CMU/SEI-2003-TN-033, December 2003. [Online]. Available: http://www.sei.cmu.edu/library/abstracts/ reports/03tn033.cfm
-
Common Concepts Underlying Safety, Security, and Survivability Engineering
-
-
Firesmith, D.1
-
11
-
-
34748904872
-
A methodology for safety case development
-
F. Redmill and T. Anderson, Eds. Birmingham, UK: Springer
-
P. Bishop and R. Bloomfield, "A methodology for safety case development," in Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium, F. Redmill and T. Anderson, Eds. Birmingham, UK: Springer, 1998, pp. 194-203.
-
(1998)
Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium
, pp. 194-203
-
-
Bishop, P.1
Bloomfield, R.2
-
12
-
-
79959945737
-
Safety and assurance cases:Past, present and possible future-An adelard perspective
-
C. Dale and T. Anderson, Eds. Bristol, UK: Springer-Verlag, February
-
R. Bloomfield and P. Bishop, "Safety and assurance cases: Past, present and possible future-An adelard perspective," in Making Systems Safer-Proc. of the Eighteenth Safety-Critical Systems Symposium, C. Dale and T. Anderson, Eds. Bristol, UK: Springer-Verlag, February 2010, pp. 51-67.
-
(2010)
Making Systems Safer-Proc. of the Eighteenth Safety-Critical Systems Symposium
, pp. 51-67
-
-
Bloomfield, R.1
Bishop, P.2
-
13
-
-
84894352563
-
-
Federal Motor Vehicle Safety Standards and Regulations, Office of vehicle safety compliance Std., Dec. 2012
-
Federal Motor Vehicle Safety Standards and Regulations, Office of vehicle safety compliance Std., Dec. 2012. [Online]. Available: http://www.nhtsa.gov/ cars/rules/import/fmvss/index.html
-
-
-
-
15
-
-
80051991023
-
AVATAR:A sysML environment for the formal verification of safety and security properties
-
Paris, France, Mar
-
G. Pedroza, L. Apvrille, and D. Knorreck, "AVATAR: A SysML environment for the formal verification of safety and security properties," in 11th Annual International Conference on New Technologies of Distributed Systems (NOTERE), Paris, France, Mar. 2011, pp. 1-10.
-
(2011)
11th Annual International Conference on New Technologies of Distributed Systems (NOTERE)
, pp. 1-10
-
-
Pedroza, G.1
Apvrille, L.2
Knorreck, D.3
-
16
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Berkeley, CA, USA
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," in Proc. of the 20th USENIX conference on Security, ser. SEC'11, Berkeley, CA, USA, 2011, pp. 6-6.
-
(2011)
Proc. of the 20th USENIX Conference on Security, Ser. SEC'11
, pp. 6-6
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
17
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
San Diego, CA, May
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," in Proc. of IEEE Symposium on Security and Privacy, San Diego, CA, May 2010, pp. 447-462.
-
(2010)
Proc. of IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
18
-
-
77950410586
-
-
Dec.
-
A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier, M. Friedewald, T. Leimbach, A. Fuchs, S. Grgens, O. Henniger, R. Rieke, M. Ritscher, H. Broberg, L. Apvrille, R. Pacalet, and G. Pedroza. (2009, Dec.) Deliverable d2.3: Security requirements for automotive on-board networks based on dark-side scenarios. [Online]. Available: http://evita-project.org/Deliverables/EVITAD2.3.pdf
-
(2009)
Deliverable d2.3: Security Requirements for Automotive On-board Networks Based on Dark-side Scenarios
-
-
Ruddle, A.1
Ward, D.2
Weyl, B.3
Idrees, S.4
Roudier, Y.5
Friedewald, M.6
Leimbach, T.7
Fuchs, A.8
Grgens, S.9
Henniger, O.10
Rieke, R.11
Ritscher, M.12
Broberg, H.13
Apvrille, L.14
Pacalet, R.15
Pedroza, G.16
-
19
-
-
0003487308
-
-
John Wiley and Sons, New York, ch. Attack Trees
-
B. Schneier, Secrets and Lies. John Wiley and Sons, New York, 2000, ch. Attack Trees, pp. 318-333.
-
(2000)
Secrets and Lies
, pp. 318-333
-
-
Schneier, B.1
-
20
-
-
84894298946
-
-
Newcastle, UK, September
-
O. Nordland, "Some security aspects in safety related systems," Newcastle, UK, September 2008. [Online]. Available: http://www.ewics.org/ attachments/security-subgroup-newcastle-2008/ Some+Security+Aspects+in+Safety+Related+Systems.pdf
-
(2008)
Some Security Aspects in Safety Related Systems
-
-
Nordland, O.1
-
21
-
-
84894351868
-
Disentangling the relations between safety and security
-
L. Pietre-Cambacedes and C. Chaudet, "Disentangling the relations between safety and security," in Proceedings of the 9th WSEAS international conference on Applied informatics and communications, ser. AIC'09. Stevens Point, Wisconsin, USA: World Scientific and Engineering Academy and Society (WSEAS), 2009, pp. 156-161.
-
(2009)
Proceedings of the 9th WSEAS International Conference on Applied Informatics and Communications, Ser. AIC'09. Stevens Point, Wisconsin, USA: World Scientific and Engineering Academy and Society (WSEAS)
, pp. 156-161
-
-
Pietre-Cambacedes, L.1
Chaudet, C.2
-
23
-
-
33750288536
-
Ranking attack graphs
-
Hamburg, Germany, September
-
V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing, "Ranking attack graphs," in Proc. of Recent Advances in Intrusion Detection, Hamburg, Germany, September 2006, pp. 127-144.
-
(2006)
Proc. of Recent Advances in Intrusion Detection
, pp. 127-144
-
-
Mehta, V.1
Bartzis, C.2
Zhu, H.3
Clarke, E.4
Wing, J.5
-
24
-
-
33845537933
-
The impact of cooperative adaptive cruise control on traffic-flow characteristics
-
Dec
-
B. van Arem, C. van Driel, and R. Visser, "The impact of cooperative adaptive cruise control on traffic-flow characteristics," IEEE Transactions on Intelligent Transportation Systems, vol. 7, no. 4, pp. 429-436, Dec. 2006.
-
(2006)
IEEE Transactions on Intelligent Transportation Systems
, vol.7
, Issue.4
, pp. 429-436
-
-
Van Arem, B.1
Van Driel, C.2
Visser, R.3
-
25
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
Aug
-
E. W. Dijkstra, "Guarded commands, nondeterminacy and formal derivation of programs," Commun. ACM, vol. 18, no. 8, pp. 453-457, Aug. 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.W.1
|