Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference42 articles.
1. Internet crime complaint centre (IC3), motor vehicles increasingly vulnerable to remote exploits.
http://www.ic3.gov/media/2016/160317.aspx
. Accessed 17 Mar 2016
2. Eiza MH, Ni Q (2017) Driving with sharks: rethinking connected vehicles with vehicle cybersecurity. IEEE Veh Technol Mag 12(2):45–51
3. Waraksa TJ, Fraley KD, Kiefer RE, Douglas DG, Gilbert LH (1990) Passive keyless entry system, US Patent 4,942,393
4. Choi W, Seo M, Lee DH (2018) Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system. J Adv Transp 2018:1935974.
https://doi.org/10.1155/2018/1935974
5. Fu K, Xu W (2018) Risks of trusting the physics of sensors. Commun ACM 61(2):20–23
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献