-
1
-
-
84925039081
-
Connected vehicles: Solutions, challenges
-
Aug.
-
N. Lu, N. Cheng, N. Zhang, X. Shen, J. W. Mark, "Connected vehicles: Solutions, challenges, " IEEE Internet Things J., vol. 1, no. 4, pp. 289-299, Aug. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.4
, pp. 289-299
-
-
Lu, N.1
Cheng, N.2
Zhang, N.3
Shen, X.4
Mark, J.W.5
-
2
-
-
85010210050
-
-
Boston, MA, USA: Springer
-
M. H. Hebert, C. E. Thorpe, A. Stentz, Intelligent Unmanned Ground Vehicles: Autonomous Navigation Research at Carnegie Mellon, vol. 388. Boston, MA, USA: Springer, 2012.
-
(2012)
Intelligent Unmanned Ground Vehicles: Autonomous Navigation Research at Carnegie Mellon
, vol.388
-
-
Hebert, M.H.1
Thorpe, C.E.2
Stentz, A.3
-
3
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Aug.
-
S. Checkoway, et al., "Comprehensive experimental analyses of automotive attack surfaces, " in Proc. USENIX Secur. Symp., Aug. 2011, pp. 77-92.
-
(2011)
Proc. USENIX Secur. Symp.
, pp. 77-92
-
-
Checkoway, S.1
-
4
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
May
-
K. Koscher, et al., "Experimental security analysis of a modern automobile, " in Proc. IEEE Symp. Secur. Privacy, May 2010, pp. 447-462.
-
(2010)
Proc. IEEE Symp. Secur. Privacy
, pp. 447-462
-
-
Koscher, K.1
-
5
-
-
84964756992
-
Security, vulnerability, protection of vehicular onboard diagnostics
-
A. Yadav, G. Bose, R. Bhange, K. Kapoor, N. C. S. Iyengar, R. D. Caytiles, "Security, vulnerability, protection of vehicular onboard diagnostics, " Int. J. Secur. Appl., vol. 10, no. 4, pp. 405-422, 2016.
-
(2016)
Int. J. Secur. Appl.
, vol.10
, Issue.4
, pp. 405-422
-
-
Yadav, A.1
Bose, G.2
Bhange, R.3
Kapoor, K.4
Iyengar, N.C.S.5
Caytiles, R.D.6
-
7
-
-
85028151945
-
Potential cyberattacks on automated vehicles
-
Apr.
-
J. Petit, S. E. Shladover, "Potential cyberattacks on automated vehicles, " IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546-556, Apr. 2015.
-
(2015)
IEEE Trans. Intell. Transp. Syst.
, vol.16
, Issue.2
, pp. 546-556
-
-
Petit, J.1
Shladover, S.E.2
-
8
-
-
84976586648
-
Cyber security riskanalysis for intelligent transport systems, in-vehicle networks
-
Oct.
-
A. R. Ruddle, D. D. Ward, A. Perallos, U. Hernandez-Jayo, E. Onieva, I. J. Garciá-Zuazola, "Cyber security riskanalysis for intelligent transport systems, in-vehicle networks, " Intell. Transp. Syst., Technol. Appl., vol. 1, p. 83, Oct. 2015.
-
(2015)
Intell. Transp. Syst., Technol. Appl.
, vol.1
, pp. 83
-
-
Ruddle, A.R.1
Ward, D.D.2
Perallos, A.3
Hernandez-Jayo, U.4
Onieva, E.5
Garciá-Zuazola, I.J.6
-
12
-
-
85008261649
-
-
The National Cyber Security Centre (NCSC), London, U.K., Tech. Rep.
-
T. L. P. White, "Cyber-security risks in the supply chain, " The National Cyber Security Centre (NCSC), London, U.K., Tech. Rep., 2015.
-
(2015)
Cyber-security Risks in the Supply Chain
-
-
White, T.L.P.1
-
13
-
-
4644373110
-
Cyber attacks against supply chain management systems: A short note
-
M. Warren, W. Hutchinson, "Cyber attacks against supply chain management systems: A short note, " Int. J. Phys. Distrib. Logist. Manage., vol. 30, nos. 7-8, pp. 710-716, 2000.
-
(2000)
Int. J. Phys. Distrib. Logist. Manage.
, vol.30
, Issue.7-8
, pp. 710-716
-
-
Warren, M.1
Hutchinson, W.2
-
14
-
-
85037121200
-
An emerging threat: Eve meets a robot
-
K. D. Akdemir, D. Karakoyunlu, T. Padir, B. Sunar, "An emerging threat: Eve meets a robot, " in Proc. Int. Conf. Trusted Syst., 2010, pp. 271-289.
-
(2010)
Proc. Int. Conf. Trusted Syst.
, pp. 271-289
-
-
Akdemir, K.D.1
Karakoyunlu, D.2
Padir, T.3
Sunar, B.4
-
15
-
-
84876745848
-
Security of autonomous systems employing embedded computing, sensors
-
Jan.
-
A. M. Wyglinski, X. Huang, T. Padir, L. Lai, T. R. Eisenbarth, K. Venkatasubramanian, "Security of autonomous systems employing embedded computing, sensors, " IEEE Micro, vol. 33, no. 1, pp. 80-86, Jan. 2013.
-
(2013)
IEEE Micro
, vol.33
, Issue.1
, pp. 80-86
-
-
Wyglinski, A.M.1
Huang, X.2
Padir, T.3
Lai, L.4
Eisenbarth, T.R.5
Venkatasubramanian, K.6
-
16
-
-
0037328423
-
Autonomous vehicle positioning with GPS in urban canyon environments
-
Feb.
-
Y. Cui, S. S. Ge, "Autonomous vehicle positioning with GPS in urban canyon environments, " IEEE Trans. Robot. Autom., vol. 19, no. 1, pp. 15-25, Feb. 2003.
-
(2003)
IEEE Trans. Robot. Autom.
, vol.19
, Issue.1
, pp. 15-25
-
-
Cui, Y.1
Ge, S.S.2
-
17
-
-
84871138105
-
Statement on the vulnerability of civil unmanned aerial vehicles, other systems to civil GPS spoofing
-
submitted to U.S. House Representatives, Washington, DC, USA, Jul. 18
-
T. Humphreys, "Statement on the vulnerability of civil unmanned aerial vehicles, other systems to civil GPS spoofing, " submitted to the Subcommittee Oversight, Investigat. Manage. House Committee Homeland Secur., U.S. House Representatives, Washington, DC, USA, Jul. 18, 2012.
-
(2012)
The Subcommittee Oversight, Investigat. Manage. House Committee Homeland Secur.
-
-
Humphreys, T.1
-
18
-
-
80755144040
-
On the requirements for successful GPS spoofing attacks
-
Oct.
-
N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, S. Capkun, "On the requirements for successful GPS spoofing attacks, " in Proc. 18th ACM Conf. Comput. Commun. Secur., Oct. 2011, pp. 75-86.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Secur.
, pp. 75-86
-
-
Tippenhauer, N.O.1
Pöpper, C.2
Rasmussen, K.B.3
Capkun, S.4
-
19
-
-
84904971949
-
-
accessed on Aug. 18, 2016. [Online]. Available
-
Ut Austin Researchers Successfully Spoof an $80 Million Yacht at Sea, accessed on Aug. 18, 2016. [Online]. Available: Http://news.utexas.edu/2013/07/29/ut-austin-researchers-successfullyspoof-A n-80-million-yacht-at-sea
-
Ut Austin Researchers Successfully Spoof An $80 Million Yacht at Sea
-
-
-
20
-
-
84870322696
-
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks
-
D. P. Shepard, T. E. Humphreys, A. A. Fansler, "Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks, " Int. J. Critical Infrastruct. Protection, vol. 5, no. 3, pp. 146-153, 2012.
-
(2012)
Int. J. Critical Infrastruct. Protection
, vol.5
, Issue.3
, pp. 146-153
-
-
Shepard, D.P.1
Humphreys, T.E.2
Fansler, A.A.3
-
21
-
-
84891484196
-
Real-time GPS spoofing detection via correlation of encrypted signals
-
B. W. O'Hanlon, M. L. Psiaki, J. A. Bhatti, D. P. Shepard, T. E. Humphreys, "Real-time GPS spoofing detection via correlation of encrypted signals, " Navigation, vol. 60, no. 4, pp. 267-278, 2013.
-
(2013)
Navigation
, vol.60
, Issue.4
, pp. 267-278
-
-
O'Hanlon, B.W.1
Psiaki, M.L.2
Bhatti, J.A.3
Shepard, D.P.4
Humphreys, T.E.5
-
22
-
-
69949156439
-
Assessing the spoofing threat: Development of a portable GPS civilian spoofer
-
T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O'Hanlon, P. M. Kintner, Jr., "Assessing the spoofing threat: Development of a portable GPS civilian spoofer, " in Proc. ION GNSS Int. Tech. Meeting Satellite Division, vol. 55. 2008, p. 56.
-
(2008)
Proc. ION GNSS Int. Tech. Meeting Satellite Division
, vol.55
, pp. 56
-
-
Humphreys, T.E.1
Ledvina, B.M.2
Psiaki, M.L.3
O'Hanlon, B.W.4
Kintner, P.M.5
-
23
-
-
84968619392
-
Comprehensive comparisons of satellite data, signals, measurements between the BeiDou navigation satellite system, the global positioning system
-
S.-S. Jan, A.-L. Tao, "Comprehensive comparisons of satellite data, signals, measurements between the BeiDou navigation satellite system, the global positioning system, " Sensors, vol. 16, no. 5, p. 689, 2016.
-
(2016)
Sensors
, vol.16
, Issue.5
, pp. 689
-
-
Jan, S.-S.1
Tao, A.-L.2
-
24
-
-
0032651654
-
An overview of controller area network
-
Jun.
-
M. Farsi, K. Ratcliff, M. Barbosa, "An overview of controller area network, " Comput. Control Eng. J., vol. 10, no. 3, pp. 113-120, Jun. 1999.
-
(1999)
Comput. Control Eng. J.
, vol.10
, Issue.3
, pp. 113-120
-
-
Farsi, M.1
Ratcliff, K.2
Barbosa, M.3
-
25
-
-
0004049320
-
-
Postfach 300240, Bosch, Rober Bousch GmbH, Stuttgart, Germany
-
Can Specification Version 2.0, Postfach 300240, Bosch, Rober Bousch GmbH, Stuttgart, Germany, 1991.
-
(1991)
Can Specification Version 2.0
-
-
-
26
-
-
84945916978
-
Lightweight authentication for secure automotive networks
-
P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, S. Chakraborty, "Lightweight authentication for secure automotive networks, " in Proc. Design, Autom. Test Eur. Conf. Exhibit., 2015, pp. 285-288.
-
(2015)
Proc. Design, Autom. Test Eur. Conf. Exhibit.
, pp. 285-288
-
-
Mundhenk, P.1
Steinhorst, S.2
Lukasiewycz, M.3
Fahmy, S.A.4
Chakraborty, S.5
-
27
-
-
79955055354
-
-
U.S Dept. Transp., Washington, DC, USA, Tech. Rep. DOT HS 811 086
-
S. Singh, K. Kingsley, C.-L. Chen, "Tire pressure maintenance-A statistical investigation, " U.S Dept. Transp., Washington, DC, USA, Tech. Rep. DOT HS 811 086, 2009.
-
(2009)
Tire Pressure Maintenance-A Statistical Investigation
-
-
Singh, S.1
Kingsley, K.2
Chen, C.-L.3
-
28
-
-
85037070694
-
-
Cars Safer From 1 November accessed on Aug. 16, 2016. [Online]. Available
-
Cars Safer From 1 November 2012, accessed on Aug. 16, 2016. [Online]. Available: Http://europa.eu/rapid/press-release-IP-12-1169-en.htm
-
(2012)
-
-
-
29
-
-
85040565418
-
Security, privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
Washington, DC, USA, Feb.
-
I. Roufa, et al., "Security, privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, " in Proc. 19th USENIX Secur. Symp., Washington, DC, USA, Feb. 2010, pp. 11-13.
-
(2010)
Proc. 19th USENIX Secur. Symp.
, pp. 11-13
-
-
Roufa, I.1
-
30
-
-
85013229011
-
Hacking cars
-
Nov.
-
A. Wright, "Hacking cars, " Commun. ACM, vol. 54, no. 11, pp. 18-19, Nov. 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.11
, pp. 18-19
-
-
Wright, A.1
-
31
-
-
4544219570
-
-
Ph.D. dissertation Dept. Inf. Sci. Telecommun., Univ. Pittsburgh, Pittsburgh, PA, USA
-
S. A. Hirani, "Energy consumption of encryption schemes in wireless devices, " Ph.D. dissertation, Dept. Inf. Sci. Telecommun., Univ. Pittsburgh, Pittsburgh, PA, USA, 2003.
-
(2003)
Energy Consumption of Encryption Schemes in Wireless Devices
-
-
Hirani, S.A.1
-
32
-
-
84979583740
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
Researcher Hacks Self-Driving Car Sensors, accessed on Aug. 16, 2016. [Online]. Available: Http://spectrum.ieee.org/cars-that-think/transportation/self-driving/researcher-hacks-selfdriving-car-sensors
-
Researcher Hacks Self-Driving Car Sensors
-
-
-
33
-
-
85037092141
-
Obstacle detection using mono vision camera, laser scanner
-
S. Mahajan, R. Bhosale, P. Kulkarni, "Obstacle detection using mono vision camera, laser scanner, " Int. J. Res. Eng. Technol., vol. 2, no. 12, pp. 684-690, 2013
-
(2013)
Int. J. Res. Eng. Technol.
, vol.2
, Issue.12
, pp. 684-690
-
-
Mahajan, S.1
Bhosale, R.2
Kulkarni, P.3
-
34
-
-
13344260645
-
Lane-level positioning for in-vehicle navigation, automated vehicle location (AVL) systems
-
Oct.
-
J. Du, J. Masters, M. Barth, "Lane-level positioning for in-vehicle navigation, automated vehicle location (AVL) systems, " in Proc. 7th Int. IEEE Conf. Intell. Transp. Syst., Oct. 2004, pp. 35-40.
-
(2004)
Proc. 7th Int. IEEE Conf. Intell. Transp. Syst.
, pp. 35-40
-
-
Du, J.1
Masters, J.2
Barth, M.3
-
35
-
-
85037158236
-
Object boundary recognition using b-snake
-
Jul.
-
D. Giveki, R. Bahmanyar, A. Mohammad, Y. Soltanshahi, H. Khademian, H. Salimi, "Object boundary recognition using b-snake, " Can. J. Image Process. Comput. Vis., vol. 2, no. 6, pp. 64-71, Jul. 2011.
-
(2011)
Can. J. Image Process. Comput. Vis.
, vol.2
, Issue.6
, pp. 64-71
-
-
Giveki, D.1
Bahmanyar, R.2
Mohammad, A.3
Soltanshahi, Y.4
Khademian, H.5
Salimi, H.6
-
36
-
-
33845520630
-
Lane detection with moving vehicles in the traffic scenes
-
Dec.
-
H.-Y. Cheng, B.-S. Jeng, P.-T. Tseng, K.-C. Fan, "Lane detection with moving vehicles in the traffic scenes, " IEEE Trans. Intell. Transp. Syst., vol. 7, no. 4, pp. 571-582, Dec. 2006.
-
(2006)
IEEE Trans. Intell. Transp. Syst.
, vol.7
, Issue.4
, pp. 571-582
-
-
Cheng, H.-Y.1
Jeng, B.-S.2
Tseng, P.-T.3
Fan, K.-C.4
-
37
-
-
32544439362
-
A system for traffic sign detection, tracking, recognition using color, shape, motion information
-
Jun.
-
C. Bahlmann, Y. Zhu, V. Ramesh, M. Pellkofer, T. Koehler, "A system for traffic sign detection, tracking, recognition using color, shape, motion information, " in Proc. IEEE Intell. Veh. Symp., Jun. 2005, pp. 255-260.
-
(2005)
Proc. IEEE Intell. Veh. Symp.
, pp. 255-260
-
-
Bahlmann, C.1
Zhu, Y.2
Ramesh, V.3
Pellkofer, M.4
Koehler, T.5
-
38
-
-
84878716418
-
Enhancing light blob detection for intelligent headlight control using lane detection
-
Jun.
-
S. Eum, H. G. Jung, "Enhancing light blob detection for intelligent headlight control using lane detection, " IEEE Trans. Intell. Transp. Syst., vol. 14, no. 2, pp. 1003-1011, Jun. 2013.
-
(2013)
IEEE Trans. Intell. Transp. Syst.
, vol.14
, Issue.2
, pp. 1003-1011
-
-
Eum, S.1
Jung, H.G.2
-
39
-
-
85037067934
-
-
Univ. Rochester, Rochester, NY, USA, Tech Rep
-
K. Boccuzzi, "Investigating the causes of, possible remedies for sensor damage in digital cameras used on the omega laser systems, " Univ. Rochester, Rochester, NY, USA, Tech Rep., 2008.
-
(2008)
Investigating the Causes Of, Possible Remedies for Sensor Damage in Digital Cameras Used On the Omega Laser Systems
-
-
Boccuzzi, K.1
-
40
-
-
85037116744
-
-
Mts accessed on Aug. 16, 2016. [Online]. Available
-
Mts. Analysis of Laser Light Threat to CCTV, accessed on Aug. 16, 2016. [Online]. Available: Http://www.mts-iss.com/affects-of-lasers.html, .
-
Analysis of Laser Light Threat to CCTV
-
-
-
41
-
-
84951157730
-
-
Univ. Parma, Parma, Italy, Tech. Rep., Aug.
-
L. Gomes, "Hidden obstacles for googles self-driving cars: Impressive progress hides major limitations of googles quest for automated driving, " Univ. Parma, Parma, Italy, Tech. Rep., Aug. 2014.
-
(2014)
Hidden Obstacles for Googles Self-driving Cars: Impressive Progress Hides Major Limitations of Googles Quest for Automated Driving
-
-
Gomes, L.1
-
43
-
-
85037099508
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
'Walkie-Talkie' Skyscraper Melts Jaguar Car Parts, accessed on Aug. 16, 2016. [Online]. Available: Http://www.bbc.co.uk/news/ukengland-london-23930675
-
'Walkie-Talkie' Skyscraper Melts Jaguar Car Parts
-
-
-
44
-
-
80051968597
-
The BRAiVE autonomous ground vehicle platform?
-
P. Grisleri, I. Fedriga, "The BRAiVE autonomous ground vehicle platform?" IFAC Proc. Vols, vol. 43, no. 16, pp. 497-502, 2010.
-
(2010)
IFAC Proc. Vols
, vol.43
, Issue.16
, pp. 497-502
-
-
Grisleri, P.1
Fedriga, I.2
-
45
-
-
85037134059
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
Cyber Security, the Future of Driverless Cars, accessed on Aug. 16, 2016. [Online]. Available: Http://www.nesta.org.uk/blog/cybersecurity-A nd-future-driverless-cars
-
Cyber Security, the Future of Driverless Cars
-
-
-
46
-
-
84867002437
-
FlexRay electrical physical layer: Theory, components, examples
-
J. Minuth, "FlexRay electrical physical layer: Theory, components, examples, " in Proc. 14th Int. Conf. Trans. Opt. Netw. (ICTON), 2012, pp. 1-10.
-
(2012)
Proc. 14th Int. Conf. Trans. Opt. Netw. (ICTON)
, pp. 1-10
-
-
Minuth, J.1
-
47
-
-
84915809275
-
Privacy in autonomous vehicles
-
D. J. Glancy, "Privacy in autonomous vehicles, " Santa Clara L. Rev., vol. 52, no. 4, p. 1171, 2012.
-
(2012)
Santa Clara L. Rev.
, vol.52
, Issue.4
, pp. 1171
-
-
Glancy, D.J.1
-
48
-
-
84998954703
-
-
Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep.
-
D. Klinedinst, C. King, "On board diagnostics: Risks, vulnerabilities of the connected vehicle, " Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep., 2016.
-
(2016)
On Board Diagnostics: Risks, Vulnerabilities of the Connected Vehicle
-
-
Klinedinst, D.1
King, C.2
-
49
-
-
85037092894
-
-
Aug. 16 [Online]. Available
-
Researchers Hack Into Driverless Car System, Take Control Of Vehicle, Aug. 16, 2016. [Online]. Available: Http://www.nationaldefense magazine.org/archive/2015/May/Pages/ResearchersHackIntoDriverless CarSystemTakeControlofVehicle.aspx
-
(2016)
Researchers Hack into Driverless Car System Take Control of Vehicle
-
-
-
50
-
-
84882707425
-
The performance analysis of a real-time integrated INS/GPS vehicle navigation system with abnormal GPS measurement elimination
-
K.-W. Chiang, T. T. Duong, J.-K. Liao, "The performance analysis of a real-time integrated INS/GPS vehicle navigation system with abnormal GPS measurement elimination, " Sensors, vol. 13, no. 8, pp. 10599-10622, 2013.
-
(2013)
Sensors
, vol.13
, Issue.8
, pp. 10599-10622
-
-
Chiang, K.-W.1
Duong, T.T.2
Liao, J.-K.3
-
51
-
-
84929768227
-
-
ASIS Int., Alexandria, VA, USA
-
C. Miller, C. Valasek, A Survey of Remote Automotive Attack Surfaces, ASIS Int., Alexandria, VA, USA, 2014.
-
(2014)
A Survey of Remote Automotive Attack Surfaces
-
-
Miller, C.1
Valasek, C.2
-
53
-
-
84969877105
-
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks
-
D. K. Nilsson, U. E. Larson, "Conducting forensic investigations of cyber attacks on automobile in-vehicle networks, " in Proc. 1st Int. Conf. Forensic Appl. Techn. Telecommun., Inf., Multimedia Workshop, 2008, Art. no. 8.
-
(2008)
Proc. 1st Int. Conf. Forensic Appl. Techn. Telecommun., Inf., Multimedia Workshop
-
-
Nilsson, D.K.1
Larson, U.E.2
-
54
-
-
56449088327
-
Creating a secure infrastructure for wireless diagnostics, software updates in vehicles
-
D. K. Nilsson, U. E. Larson, E. Jonsson, "Creating a secure infrastructure for wireless diagnostics, software updates in vehicles, " in Proc. Int. Conf. Comput. Safety, Rel., Secur., 2008, pp. 207-220.
-
(2008)
Proc. Int. Conf. Comput. Safety, Rel., Secur.
, pp. 207-220
-
-
Nilsson, D.K.1
Larson, U.E.2
Jonsson, E.3
-
55
-
-
78651579602
-
A defense-in-depth approach to securing the wireless vehicle infrastructure
-
D. K. Nilsson, U. E. Larson, "A defense-in-depth approach to securing the wireless vehicle infrastructure, " J. Netw., vol. 4, no. 7, pp. 552-564, 2009.
-
(2009)
J. Netw.
, vol.4
, Issue.7
, pp. 552-564
-
-
Nilsson, D.K.1
Larson, U.E.2
-
56
-
-
84907075925
-
-
Univ. Gothenburg, Gothenburg, Sweden, Tech. Rep
-
J. Lindberg, "Security analysis of vehicle diagnostics using DoIP, " Univ. Gothenburg, Gothenburg, Sweden, Tech. Rep., 2011.
-
(2011)
Security Analysis of Vehicle Diagnostics Using DoIP
-
-
Lindberg, J.1
-
57
-
-
84919471140
-
Defending connected vehicles against malware: Challenges, a solution framework
-
Feb.
-
T. Zhang, H. Antunes, S. Aggarwal, "Defending connected vehicles against malware: Challenges, a solution framework, " IEEE Internet Things J., vol. 1, no. 1, pp. 10-21, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 10-21
-
-
Zhang, T.1
Antunes, H.2
Aggarwal, S.3
-
59
-
-
77249157951
-
Balanced trustworthiness, safety, privacy in vehicle-to-vehicle communications
-
Feb.
-
Q. Wu, J. Domingo-Ferrer, Ú. Gonzalez-Nicolas, "Balanced trustworthiness, safety, privacy in vehicle-to-vehicle communications, " IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
60
-
-
84859183740
-
Enhancing privacy, accuracy in probe vehicle-based traffic monitoring via virtual trip lines
-
May
-
B. Hoh, et al., "Enhancing privacy, accuracy in probe vehicle-based traffic monitoring via virtual trip lines, " IEEE Trans. Mobile Comput., vol. 11, no. 5, pp. 849-864, May 2012.
-
(2012)
IEEE Trans. Mobile Comput.
, vol.11
, Issue.5
, pp. 849-864
-
-
Hoh, B.1
-
61
-
-
84905401458
-
A behavioral planning framework for autonomous driving
-
Jun.
-
J. Wei, J. M. Snider, T. Gu, J. M. Dolan, B. Litkouhi, "A behavioral planning framework for autonomous driving, " in Proc. IEEE Intell. Veh. Symp., Jun. 2014, pp. 458-464.
-
(2014)
Proc. IEEE Intell. Veh. Symp.
, pp. 458-464
-
-
Wei, J.1
Snider, J.M.2
Gu, T.3
Dolan, J.M.4
Litkouhi, B.5
-
62
-
-
84944128883
-
-
Ph.D. dissertation Dept. Electr. Comput. Eng., Ohio State Univ., Columbus, OH, USA
-
V. N. Gadepally, "Estimation of driver behavior for autonomous vehicle applications, " Ph.D. dissertation, Dept. Electr. Comput. Eng., Ohio State Univ., Columbus, OH, USA, 2013.
-
(2013)
Estimation of Driver Behavior for Autonomous Vehicle Applications
-
-
Gadepally, V.N.1
-
64
-
-
85037068661
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
Google Gives More Detail on Safety of its Autonomous Cars, accessed on Aug. 16, 2016. [Online]. Available: Http://www.cnbc.com/2016/01/12/google-gives-more-detail-on-safety-of-its-autonomous-cars.html
-
Google Gives More Detail On Safety of Its Autonomous Cars
-
-
-
65
-
-
0029257139
-
How in the world did we ever get into that mode? Mode error, awareness in supervisory control
-
N. B. Sarter, D. D. Woods, "How in the world did we ever get into that mode? mode error, awareness in supervisory control, " Human Factors: J. Human Factors Ergonom. Soc., vol. 37, no. 1, pp. 5-19, 1995.
-
(1995)
Human Factors: J. Human Factors Ergonom. Soc.
, vol.37
, Issue.1
, pp. 5-19
-
-
Sarter, N.B.1
Woods, D.D.2
-
66
-
-
85037096809
-
Vehicle-to-vehicle/vehicle-to-infrastructure control
-
Washington DC, USA
-
L. Glielmo, Vehicle-to-Vehicle/Vehicle-to-Infrastructure Control, IEEE Control Syst. Soc., Washington, DC, USA, 2010.
-
(2010)
IEEE Control Syst. Soc.
-
-
Glielmo, L.1
-
67
-
-
77956926901
-
Security attacks, solutions for vehicular ad hoc networks
-
J. T. Isaac, S. Zeadally, J. S. Camara, "Security attacks, solutions for vehicular ad hoc networks, " IET Commun. J., vol. 4, no. 7, pp. 894-903, 2010.
-
(2010)
IET Commun. J.
, vol.4
, Issue.7
, pp. 894-903
-
-
Isaac, J.T.1
Zeadally, S.2
Camara, J.S.3
-
68
-
-
79959948198
-
Classes 1752 of attacks in VANET
-
Apr.
-
I. A. Sumra, I. Ahmad, H. Hasbullah, J. B. A. Manan, "Classes 1752 of attacks in VANET, " in Proc. Saudi Int. Electron. Commun. Photon. Conf. (SIECPC), vol. 1753. Apr. 2011, pp. 1-5.
-
(2011)
Proc. Saudi Int. Electron. Commun. Photon. Conf. (SIECPC)
, vol.1753
, pp. 1-5
-
-
Sumra, I.A.1
Ahmad, I.2
Hasbullah, H.3
Manan, J.B.A.4
-
69
-
-
85037126851
-
-
SAE, Auvergne-Rhône-Alpes, France, Tech. Rep. 2006-01-1426
-
M. Jenkins, S. M. Mahmud, "Security needs for the future intelligent vehicles, " SAE, Auvergne-Rhône-Alpes, France, Tech. Rep. 2006-01-1426, 2006.
-
(2006)
Security Needs for the Future Intelligent Vehicles
-
-
Jenkins, M.1
Mahmud, S.M.2
-
70
-
-
84979836592
-
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
-
R. Verdult, F. D. Garcia, B. Ege, "Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer, " in Proc. 22nd USENIX Secur. Symp. (USENIX Security), 2015, pp. 703-718.
-
(2015)
Proc. 22nd USENIX Secur. Symp. (USENIX Security)
, pp. 703-718
-
-
Verdult, R.1
Garcia, F.D.2
Ege, B.3
-
71
-
-
84937941633
-
Identification of malicious vehicle in VANET environment from DDOS attack
-
A. Pathre, "Identification of malicious vehicle in VANET environment from DDOS attack, " J. Global Res. Comput. Sci., vol. 4, no. 6, pp. 30-34, 2013.
-
(2013)
J. Global Res. Comput. Sci.
, vol.4
, Issue.6
, pp. 30-34
-
-
Pathre, A.1
-
72
-
-
84887347069
-
A novel defense scheme against DDOS attack in VANET
-
Jul.
-
A. Pathre, C. Agrawal, A. Jain, "A novel defense scheme against DDOS attack in VANET, " in Proc. 10th Int. Conf. Wireless Opt. Commun. Netw. (WOCN), Jul. 2013, pp. 1-5.
-
(2013)
Proc. 10th Int. Conf. Wireless Opt. Commun. Netw. (WOCN)
, pp. 1-5
-
-
Pathre, A.1
Agrawal, C.2
Jain, A.3
-
73
-
-
84893556917
-
VANET: Security attacks, its possible solutions
-
A. Rawat, S. Sharma, R. Sushil, "VANET: Security attacks, its possible solutions, " J. Inf. Oper. Manage., vol. 3, no. 1, p. 301, 2012.
-
(2012)
J. Inf. Oper. Manage.
, vol.3
, Issue.1
, pp. 301
-
-
Rawat, A.1
Sharma, S.2
Sushil, R.3
-
74
-
-
85037170717
-
Denial of service (DOS) attack, its possible solutions in VANET
-
May
-
H. Hasbullah, I. A. Soomro, J. B. A. Manan, "Denial of service (DOS) attack, its possible solutions in VANET, " World Acad. Sci., Eng. Technol., vol. 65, p. 20, May 2010.
-
(2010)
World Acad. Sci., Eng. Technol.
, vol.65
, pp. 20
-
-
Hasbullah, H.1
Soomro, I.A.2
Manan, J.B.A.3
-
75
-
-
57749193296
-
An approach to specification-based attack detection for in-vehicle networks
-
Jun.
-
U. E. Larson, D. K. Nilsson, E. Jonsson, "An approach to specification-based attack detection for in-vehicle networks, " in Proc. IEEE Intell. Veh. Symp., Jun. 2008, pp. 220-225.
-
(2008)
Proc. IEEE Intell. Veh. Symp.
, pp. 220-225
-
-
Larson, U.E.1
Nilsson, D.K.2
Jonsson, E.3
-
76
-
-
58149105785
-
A first simulation of attacks in the automotive network communications protocol flexray
-
D. K. Nilsson, U. E. Larson, F. Picasso, E. Jonsson, "A first simulation of attacks in the automotive network communications protocol flexray, " in Proc. Int. Workshop Comput. Intell. Secur. Inf. Syst. (CISIS), 2009, pp. 84-91.
-
(2009)
Proc. Int. Workshop Comput. Intell. Secur. Inf. Syst. (CISIS)
, pp. 84-91
-
-
Nilsson, D.K.1
Larson, U.E.2
Picasso, F.3
Jonsson, E.4
-
77
-
-
84856834774
-
Progress, challenges in intelligent vehicle area networks
-
Feb.
-
M. Faezipour, M. Nourani, A. Saeed, S. Addepalli, "Progress, challenges in intelligent vehicle area networks, " Commun. ACM, vol. 55, no. 2, pp. 90-100, Feb. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.2
, pp. 90-100
-
-
Faezipour, M.1
Nourani, M.2
Saeed, A.3
Addepalli, S.4
-
78
-
-
85037165488
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
Connected Cards the Open Road for Hackers, accessed on Aug. 16, 2016. [Online]. Available: Https://www.fireeye.com/blog/threatresearch/2016/06/connected-cars-the.html
-
Connected Cards the Open Road for Hackers
-
-
-
79
-
-
79953250634
-
Secure automotive on-board protocols: A case of overthe-A ir firmware updates
-
Berlin, Germany: Springer
-
M. S. Idrees, H. Schweppe, Y. Roudier, M. Wolf, D. Scheuermann, O. Henniger, "Secure automotive on-board protocols: A case of overthe-A ir firmware updates, " in Communication Technologies for Vehicles. Berlin, Germany: Springer, 2011, pp. 224-238.
-
(2011)
Communication Technologies for Vehicles
, pp. 224-238
-
-
Idrees, M.S.1
Schweppe, H.2
Roudier, Y.3
Wolf, M.4
Scheuermann, D.5
Henniger, O.6
-
80
-
-
85037079216
-
-
accessed on Aug. 16, 2016. [Online]. Available
-
BMW OBD Port Theft-The Solution, accessed on Aug. 16, 2016. [Online]. Available: Http://www.clifford.co.uk/BMW-OBD-Theft.html
-
BMW OBD Port Theft-The Solution
-
-
-
81
-
-
81355161218
-
Feasibility analysis of vehicular dynamic spectrum access via queueing theory model
-
Nov.
-
S. Chen, A. M. Wyglinski, S. Pagadarai, R. Vuyyuru, O. Altintas, "Feasibility analysis of vehicular dynamic spectrum access via queueing theory model, " IEEE Commun. Mag., vol. 49, no. 11, pp. 156-163, Nov. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.11
, pp. 156-163
-
-
Chen, S.1
Wyglinski, A.M.2
Pagadarai, S.3
Vuyyuru, R.4
Altintas, O.5
-
83
-
-
84883583254
-
A security layer for smartphone-to-vehicle communication over Bluetooth
-
Sep.
-
A. Dardanelli, et al., "A security layer for smartphone-to-vehicle communication over Bluetooth, " IEEE Embedded Syst. Lett., vol. 5, no. 3, pp. 34-37, Sep. 2013.
-
(2013)
IEEE Embedded Syst. Lett.
, vol.5
, Issue.3
, pp. 34-37
-
-
Dardanelli, A.1
-
84
-
-
85084164108
-
Bluesniff: Eve meets alice, bluetooth
-
D. Spill, A. Bittau, "Bluesniff: Eve meets alice, bluetooth, " in Proc. WOOT, vol. 7. 2007, pp. 1-10.
-
(2007)
Proc. WOOT
, vol.7
, pp. 1-10
-
-
Spill, D.1
Bittau, A.2
-
85
-
-
60749124570
-
Denial of service attacks on inter-vehicle communication networks
-
Oct.
-
J. J. Blum, A. Neiswender, A. Eskandarian, "Denial of service attacks on inter-vehicle communication networks, " in Proc. 11th Int. IEEE Conf. Intell. Transp. Syst, Oct. 2008, pp. 797-802.
-
(2008)
Proc. 11th Int. IEEE Conf. Intell. Transp. Syst
, pp. 797-802
-
-
Blum, J.J.1
Neiswender, A.2
Eskandarian, A.3
-
86
-
-
42949106628
-
Studies on novel anti-jamming technique of unmanned aerial vehicle data link
-
H. Wenzhun, W. Yongsheng, Y. Xiangyang, "Studies on novel anti-jamming technique of unmanned aerial vehicle data link, " Chin. J. Aeronautics, vol. 21, no. 2, pp. 141-148, 2008.
-
(2008)
Chin. J. Aeronautics
, vol.21
, Issue.2
, pp. 141-148
-
-
Wenzhun, H.1
Yongsheng, W.2
Xiangyang, Y.3
-
87
-
-
33845581459
-
Analysis of an ultra-tightly coupled GPS/INS system in jamming
-
Apr.
-
E. J. Ohlmeyer, "Analysis of an ultra-tightly coupled GPS/INS system in jamming, " in Proc. IEEE/ION Position, Location, Navigat. Symp., Apr. 2006, pp. 44-53.
-
(2006)
Proc. IEEE/ION Position, Location, Navigat. Symp.
, pp. 44-53
-
-
Ohlmeyer, E.J.1
-
89
-
-
84892572249
-
Inter-vehicle communication systems: A survey
-
2nd Quart.
-
M. L. Sichitiu, M. Kihl, "Inter-vehicle communication systems: A survey, " IEEE Commun. Surveys Tuts., vol. 10, no. 2, pp. 88-105, 2nd Quart., 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.2
, pp. 88-105
-
-
Sichitiu, M.L.1
Kihl, M.2
-
90
-
-
77951113447
-
Path planning for autonomous vehicles in unknown semi-structured environments
-
D. Dmitri, et al, "Path planning for autonomous vehicles in unknown semi-structured environments, " Int. J. Robot. Res., vol. 29, no. 5, pp. 485-501, 2010.
-
(2010)
Int. J. Robot. Res.
, vol.29
, Issue.5
, pp. 485-501
-
-
Dmitri, D.1
-
91
-
-
85037133962
-
Towards fully autonomous driving: Systems, algorithms
-
J. Levinson, et al, "Towards fully autonomous driving: Systems, algorithms, " in Proc. Intell. Veh. Symp. (IV), 2011.
-
(2011)
Proc. Intell. Veh. Symp. (IV)
-
-
Levinson, J.1
|