Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems 2015
DOI: 10.1145/2735960.2735992
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-physical security for smart cars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…The authors of [ 17 ] classify the environment-vehicle-driver threats for cyber, physical and cyber-physical. They also represent a two-dimensional classification, where the other dimension is constituted of vulnerabilities, attacks and threats.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The authors of [ 17 ] classify the environment-vehicle-driver threats for cyber, physical and cyber-physical. They also represent a two-dimensional classification, where the other dimension is constituted of vulnerabilities, attacks and threats.…”
Section: Related Workmentioning
confidence: 99%
“…This section aims at threat classification with the purpose of defining which classes of threats can be detected via usage of smartphone. On this basis, the classification from [ 17 ] was used. In order to define sources and aims of threats, the vulnerabilities, attacks and threats that can take place in the Driver-Environment-DAS system were considered.…”
Section: Classification Of Potential Threats In Vehicle Cabinmentioning
confidence: 99%
See 2 more Smart Citations
“…So the security of CPS is one of the vital paradigms for this. But securing cyber-physical systems is also a challenging task due to its heterogeneity of components, complex interactions among cyber-physical systems, and the attack surface's complexities [2]. It is observed that an intruder can randomly interrupt the dynamism of systems or encourage agitations to cyber-physical systems deprived of the security of various strategies of hardware or software, which leads to substantial social victims or the lives of humans [3] [4] [5] [6] [7] [8] [9].…”
Section: Introductionmentioning
confidence: 99%