Saeed et al., 2023 - Google Patents
A review: Cybersecurity challenges and their solutions in connected and autonomous vehicles (CAVs)Saeed et al., 2023
View PDF- Document ID
- 13086846497725825086
- Author
- Saeed Z
- Masood M
- Khan M
- Publication year
- Publication venue
- JAREE (Journal on Advanced Research in Electrical Engineering)
External Links
Snippet
Abstract Connected and Autonomous Vehicles (CAVs) are a crucial breakthrough in the automotive industry and a magnificent step toward a safe, secure, and intelligent transportation system (ITS). CAVs offer tremendous benefits to our society and environment …
- 241000725585 Chicken anemia virus 0 title description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L12/40006—Architecture of a communication node
- H04L12/40013—Details regarding a bus controller
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/16—Anti-collision systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bendiab et al. | Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence | |
| El-Rewini et al. | Cybersecurity attacks in vehicular sensors | |
| Kim et al. | Automotive cyber security | |
| Kukkala et al. | Roadmap for cybersecurity in autonomous vehicles | |
| Saeed et al. | A review: Cybersecurity challenges and their solutions in connected and autonomous vehicles (CAVs) | |
| Bozdal et al. | A survey on can bus protocol: Attacks, challenges, and potential solutions | |
| Wyglinski et al. | Security of autonomous systems employing embedded computing and sensors | |
| Cui et al. | Collaborative analysis framework of safety and security for autonomous vehicles | |
| Petit et al. | Potential cyberattacks on automated vehicles | |
| He et al. | Towards a severity assessment method for potential cyber attacks to connected and autonomous vehicles | |
| Scalas et al. | Automotive cybersecurity: Foundations for next-generation vehicles | |
| Mehta et al. | Securing the future: A comprehensive review of security challenges and solutions in advanced driver assistance systems | |
| Takahashi | An overview of cyber security for connected vehicles | |
| Ahmad et al. | A comprehensive survey and tutorial on smart vehicles: Emerging technologies, security issues, and solutions using machine learning | |
| Boumiza et al. | Intrusion threats and security solutions for autonomous vehicle networks | |
| Kim et al. | In-vehicle communication and cyber security | |
| Niroumand et al. | Security of connected and autonomous vehicles: A review of attacks and mitigation strategies | |
| Suo et al. | Merging safety and cybersecurity analysis in product design | |
| Tanaji et al. | A survey of cybersecurity challenges and mitigation techniques for connected and autonomous vehicles | |
| Francia | Connected vehicle security | |
| Yadav et al. | Review of attacks on connected and autonomous vehicles (CAV) and their existing solutions | |
| Scalas et al. | On the role of explainable machine learning for secure smart vehicles | |
| Chen et al. | How to protect smart and autonomous vehicles from stealth viruses and worms | |
| Hossain et al. | Survey on security attacks in connected and autonomous vehicular systems | |
| Yu et al. | Security concerns for automotive communication and software architecture |