Automotive information security: A threat with an end?

被引:0
|
作者
Burton, S. [1 ]
Ebert, Chr. [1 ]
Amsler, K.-J. [1 ]
Lederer, D. [1 ]
机构
[1] Vector Consulting Services GmbH, Stuttgart
来源
VDI Berichte | 2007年 / 2000期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:497 / 508
相关论文
共 50 条
  • [41] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [42] Security lapses and the omission of information security measures: A threat control model and empirical test
    Workman, Michael
    Bommer, William H.
    Straub, Detmar
    COMPUTERS IN HUMAN BEHAVIOR, 2008, 24 (06) : 2799 - 2816
  • [43] Systematic threat assessment and security testing of automotive over-the-air (OTA) updates
    Mahmood, Shahid
    Nguyen, Hoang Nga
    Shaikh, Siraj Ahmed
    VEHICULAR COMMUNICATIONS, 2022, 35
  • [44] End-to-end information flow security for web services orchestration
    Ben Said, Najah
    Cristescu, Ioana
    SCIENCE OF COMPUTER PROGRAMMING, 2020, 187 (187)
  • [45] Improving Security Practices in Health Information Systems with STRIDE threat modeling
    Hossain, Md Ismail
    Hasan, Ragib
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [46] Risk assessment of complex information system security based on threat propagation
    Shi, Z. (shizz@ics.ict.ac.cn), 1600, Tsinghua University (54):
  • [47] Persistent information security - Beyond the e-commerce threat model
    Matson, Merv
    Ulieru, Mihaela
    2006 ICEC: Eighth International Conference on Electronic Commerce, Proceedings: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 271 - 277
  • [48] Information Security Evaluation Using Multi-Attribute Threat Index
    Je, Young-Man
    You, Yen-Yoo
    Na, Kwan-Sik
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (03) : 913 - 925
  • [49] Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
    Zimba, Aaron
    Wang, Zhaoshun
    Mulenga, Mwenge
    Odongo, Nickson Herbert
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (04) : 297 - 308
  • [50] Information Security Evaluation Using Multi-Attribute Threat Index
    Young-Man Je
    Yen-Yoo You
    Kwan-Sik Na
    Wireless Personal Communications, 2016, 89 : 913 - 925