Author:
Vigouroux Gauthier,Laso Pedro Merino,Claramunt Christophe,Leidinger Nathalie
Publisher
Springer Nature Singapore
Reference15 articles.
1. Bao, K., Valev, H., Wagner, M., Schmeck, H.: A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Comput. Sci.-Res. Dev. 33(1), 3–12 (2018)
2. Barnes, J., Hut, P.: A hierarchical o (n log n) force-calculation algorithm. Nature 324(6096), 446–449 (1986)
3. Berg, A., Svantesson, F.: Is your electric vehicle plotting against you?: An investigation of the ISO 15118 standard and current security implementations (2021)
4. Coetzee, S.: Results from a normative dependency analysis of geographic information standards. Comput. Stan. Interfaces 33(5), 485–493 (2011)
5. Giribabu, D., Pandey, K., Rao, K., Bothale, V.M., Reddy, S., PVV PR, Chowdhury S,: Cybersecurity in webgis environment. Int. J. Comput. Internet Secur. 10(1), 11–34 (2018)