479.575 PEOPLE
People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Bryans, Jeremy William
Coventry University
in Cooperation with on an Cooperation-Score of 37%
Topics
- control device
- abstract
- vehicle
- tree
- implementation
- architecture
- library
- security
- assessment
- modeling
- intelligence
- connected vehicle
- time window
- test bed
- internet
- case study
- computer science
- manual
- design
- specification
- automation
- defense
- design method
- submarine
- flight recorder
- iterative method
- software
- vehicle operation
- radio equipment
- military vehicle
- show 0 more
Publications (15/15 displayed)
- 2021Using internal context to detect automotive controller area network attackscitations
- 2020A Template-Based Method for the Generation of Attack Treescitations
- 2019A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Examplecitations
- 2019Enabling security checking of automotive ECUs with formal CSP modelscitations
- 2019An Evaluation Ontology Applied to Connected Vehicle Security Assurancecitations
- 2018Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windowscitations
- 2018Building an automotive security assurance case using systematic security evaluationscitations
- 2018Formalising Systematic Security Evaluations using Attack Trees for Automotive Applicationscitations
- 2018Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network
- 2017Towards A Testbed for Automotive Cybersecuritycitations
- 2017Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applicationscitations
- 2017The Internet of Automotive Thingscitations
- 2017Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applicationscitations
- 2016Combining Third Party Components Securely in Automotive Systemscitations
- 2016The identification and demonstration of plausible cyber threats against military vehicle operations from software defined radio
Places of action
conferencepaper
The identification and demonstration of plausible cyber threats against military vehicle operations from software defined radio
Topics
Search in FID move catalog