479.575 PEOPLE
People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Bryans, Jeremy William
Coventry University
in Cooperation with on an Cooperation-Score of 37%
Topics
- control device
- abstract
- vehicle
- tree
- implementation
- architecture
- library
- security
- assessment
- modeling
- intelligence
- connected vehicle
- time window
- test bed
- internet
- case study
- computer science
- manual
- design
- specification
- automation
- defense
- design method
- submarine
- flight recorder
- iterative method
- software
- vehicle operation
- radio equipment
- military vehicle
- show 0 more
Publications (15/15 displayed)
- 2021Using internal context to detect automotive controller area network attackscitations
- 2020A Template-Based Method for the Generation of Attack Treescitations
- 2019A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Examplecitations
- 2019Enabling security checking of automotive ECUs with formal CSP modelscitations
- 2019An Evaluation Ontology Applied to Connected Vehicle Security Assurancecitations
- 2018Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windowscitations
- 2018Building an automotive security assurance case using systematic security evaluationscitations
- 2018Formalising Systematic Security Evaluations using Attack Trees for Automotive Applicationscitations
- 2018Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network
- 2017Towards A Testbed for Automotive Cybersecuritycitations
- 2017Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applicationscitations
- 2017The Internet of Automotive Thingscitations
- 2017Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applicationscitations
- 2016Combining Third Party Components Securely in Automotive Systemscitations
- 2016The identification and demonstration of plausible cyber threats against military vehicle operations from software defined radio
Places of action