Bates, 2020 - Google Patents
Driverless vehicle security: Considering potential attacks and countermeasures for military applicationsBates, 2020
View PDF- Document ID
- 11027038746263035717
- Author
- Bates N
- Publication year
External Links
Snippet
There is much interest from politicians and mainstream press about the driverless vehicle with a host of interested parties fervently researching into this technology. Autonomous Vehicles (AVs) promise mitigation of accidents, reduction in greenhouse gas emissions and …
- 238000005516 engineering process 0 abstract description 72
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/008—Registering or indicating the working of vehicles communicating information to a remotely located station
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chowdhury et al. | Attacks on self-driving cars and their countermeasures: A survey | |
| Petit et al. | Potential cyberattacks on automated vehicles | |
| El-Rewini et al. | Cybersecurity attacks in vehicular sensors | |
| Bendiab et al. | Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence | |
| Sadaf et al. | Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects | |
| Mehta et al. | Securing the future: A comprehensive review of security challenges and solutions in advanced driver assistance systems | |
| Parkinson et al. | Cyber threats facing autonomous and connected vehicles: Future challenges | |
| Sharma et al. | Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art | |
| Yağdereli et al. | A study on cyber-security of autonomous and unmanned vehicles | |
| Kim et al. | Automotive cyber security | |
| Islam et al. | A review of cyber attacks on sensors and perception systems in autonomous vehicle | |
| Philipsen et al. | Threats and attacks to modern vehicles | |
| Hamad et al. | Towards comprehensive threat modeling for vehicles | |
| Sheik et al. | A comprehensive survey of threats in platooning—a cloud-assisted connected and autonomous vehicle application | |
| Rastogi et al. | Explaining radar features for detecting spoofing attacks in connected autonomous vehicles | |
| Pavithra et al. | Security algorithm for intelligent transport system in cyber-physical systems perceptive: Attacks, vulnerabilities, and countermeasures | |
| Hossain et al. | Survey on security attacks in connected and autonomous vehicular systems | |
| Bates | Driverless vehicle security: Considering potential attacks and countermeasures for military applications | |
| Kasap | Autonomous vehicles: tracing the locus of regulation and liability | |
| He | A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security | |
| Tiwari et al. | A survey: Emerging cybersecurity threats in driverless cars | |
| Brown et al. | A scoping study: crime and connected and autonomous vehicles | |
| Wierzynski | The Vulnerabilities of Autonomous Vehicles | |
| Meagher | Cybersecurity and safety concerns of future automated vehicle software | |
| King et al. | Wheel tracks, rutting a new Oregon Trail: A survey of autonomous vehicle cybersecurity and survivability analysis research |