1. Upstream (2022). Upstream Security Global Automotive Cybersecurity Report 2022, Upstream Security Ltd.
2. Miller, C., and Valasek, C. (2015, January 1–6). Remote exploitation of an unaltered passenger vehicle. Proceedings of the Black Hat USA 2015, Las Vegas, NV, USA.
3. Thing, V.L.L., and Wu, J. (2016, January 15–18). Autonomous Vehicle Security: A Taxonomy of Attacks and Defences. Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China.
4. A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems;Yu;SAE Int. J. Transp. Cybersecur. Priv.,2021
5. Zhang, Y., Han, S., Zhong, S., Shi, P., and Shao, X. (2019). Security and Privacy in New Computing Environments, Proceedings of the International Conference on Security and Privacy in New Computing Environments, Tianjin, China, 13–14 April 2019, Springer.