Open Access
Issue
MATEC Web Conf.
Volume 355, 2022
2021 International Conference on Physics, Computing and Mathematical (ICPCM2021)
Article Number 03030
Number of page(s) 8
Section Computing Methods and Computer Application
DOI https://doi.org/10.1051/matecconf/202235503030
Published online 12 January 2022
  1. Miller C, Valasek C. Remote exploitation of an unaltered passenger vehicle[J]. Black Hat USA, 2015. [Google Scholar]
  2. M. Wazid, A. K. Das, S. Shetty, and M. Jo, “A tutorial and future research for building a blockchain-based secure communication scheme for Internet of intelligent things,” IEEE Access, vol.8,pp. 88700–88716, 2020. [CrossRef] [Google Scholar]
  3. J. Petit and S. E. Shladover, “Potential cyberattacks on automated vehicles,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546–556, Apr. 2015. [Google Scholar]
  4. P. Kapoor, A. Vora, and K.-D. Kang, “Detecting and mitigating spoofing attack against an automotive radar,” in Proc. IEEE 88th V eh. Technol. Conf. (VTC-Fall), Aug. 2018, pp. 1–6. [Google Scholar]
  5. Cassias I, Kun A L. Vehicle Telematics: A Literature Review[J]. 2007. [Google Scholar]
  6. I. Rouf et al., “Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study,” in Proc. USENIX Secur. 19th USENIX Conf. Secur., 2010, pp. 1–16. [Google Scholar]
  7. K. Koscher et al., “Experimental security analysis of a modern automotive,” in Proc. IEEE Symp. Secur . Privacy, May 2010, pp. 447–462. [Google Scholar]
  8. Yu He. Research on Information Security of Networked Vehicles and Abnormaldetection Technology of CAN Bus [D]. China National Knowledge Infrastructure, 2016:1-68. [Google Scholar]
  9. Wu Chenxu. Research on Key Technology of Vehicle Internal Network Security for Internet of Vehicles [D]. CNKI, 2018: 1-75. [Google Scholar]
  10. YANG Zhe. Research on Safety Mechanism and Key Technologies for Internet of Vehicles [D]. China National Knowledge Infrastructure, 2019:1-80. [Google Scholar]
  11. Vehicle network security white paper [EB/OL]. China Academy of Information and Communications Technology, 2017:1-43.] [Google Scholar]
  12. Yang Chunying. Research and implementation of identity authentication technology for Internet of Vehicles [D]. China National Knowledge Infrastructure, 2017: 1-68. [Google Scholar]
  13. Sun Yanan. Research and Implementation of Safety Reinforcement Technology for Vehicle-mounted Communication Terminal [D]. China National Knowledge Infrastructure, 2018: 1-73. [Google Scholar]
  14. YU He. Research on Information Security of Networked Vehicle and Abnormal Detection Technology of CAN Bus [D]. China National Knowledge Infrastructure, 2018: 1-30. [Google Scholar]
  15. PENG Min. Design and Application of automotive Signal Warning System Based on Wireless Sensor Network [D]. China National Knowledge Infrastructure, 2018:1-40. [Google Scholar]
  16. Li Zhitao. Research and Analysis of Vehicle-mounted Ethernet [D]. China National Knowledge Infrastructure, 2018:1-25. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.