1. Addressing rogue vehicles by integrating computer vision, activity monitoring, and contextual information;Abegaz,2020
2. Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks;Ahmed,2021
3. Addressing malware attacks on connected and autonomous vehicles: recent techniques and challenges;Al-Sabaawi,2021
4. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving;Amoozadeh;IEEE Commun. Mag.,2015
5. Enabling the use of a planning agent for urban traffic management via enriched and integrated urban data;Antoniou;Transport. Res. C Emerg. Technol.,2019