Author:
Ouchani Samir,Khaled Abdelaziz
Publisher
Springer International Publishing
Reference23 articles.
1. Abrams, M.D.: NIMS information security threat methodology. Mitre Technical report MTR 98 W000009, MITRE, Center for Advanced Aviation System Development, McLean, Virgini, August 1998
2. Ayub, M.F., Ghawash, F., Shabbir, M.A., Kamran, M., Butt, F.A.: Next generation security and surveillance system using autonomous vehicles. In: 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), pp. 1–5, March 2018
3. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security (SEC 2011), p. 6. USENIX Association (2011)
4. Cui, J., Sabaliauskaite, G., Liew, L.S., Zhou, F., Zhang, B.: Collaborative analysis framework of safety and security for autonomous vehicles. IEEE Access 7, 148672–148683 (2019)
5. Frigault, M., Wang, L.: Measuring network security using Bayesian network-based attack graphs. In: Proceedings of the 32nd IEEE International Computer Software and Applications Conference (COMPSAC 2008), pp. 698–703 (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献