THE DEVELOPMENT METHOD OF ASSESSMENT OF CYBERSECURITY VEHICLES
Abstract
Keywords
Full Text:
PDF (Русский)References
Kolodochkin, M. Vzlom bez loma: legko li vskryt' mashinu so smartfona? [Hacking without scrap: is it easy to open a car from a smartphone?]. Access mode: http://www.zr.ru/content/articles/783458-vzlom-bez-loma-legko-li-vskryt-mashinu-so-smartfona. (Аccessed 08.10.2016).
Miller, C., Valasek, C. A Survey of Remote Automotive Attack Surfaces. In BlackHat USA, 2014. 94 p.
Ebert, C. Webinar: Automotive Cyber Security, Vector Cyber Security Symposium, Stuttgart, Vector Consulting Services GmbH, 2016. 52 p.
Onishi, H. Paradigm Change of Vehicle Cyber Security, New York, NATO CCD COE, 2012, pp. 381-391.
Onishi, H. Guidelines for Vehicle Cyber Security, Alpine Electronics, Inc., 2013, Access mode: http://s3.amazonaws.com/sdieee/1737-Hiro+SDIEEE+ PACE+20140429_CyberSecurity_K_legal.pdf (Accessed 08.10.2016).
Ruddle, A. Security risk analysis approach for on-board vehicle networks. The Fully Networked Car, Geneva, Geneva International Motor Show Publ., 2011. 25 p.
Hank, P., Suermann, T., Müller, S. Automotive Ethernet, a holistic approach for a next-generation in-vehicle networking standard, NXP Semiconductors Germany, 2012, Access mode: http://itersnews.com/?p=10541 (Accessed 08.10.2016).
Clare, D., Cooper, G., Handschuh, H., and etc. Automotive Security Best Practices, Santa Clara, McAfee. Part of Intel Security Publ., 2015. 19 p.
Checkoway, S., Koscher, K., Czeskis, A., and etc. Comprehensive Experimental Analyses of Automotive Attack Surfaces, Washington, USENIX Security Publ., 2011. 16 p.
Van Roermund, T. Secure connected cars for a smarter world. Security Architect, BU Automotive, Eindhoven, NXP Semiconductors, 2015. 30 p.
Sallam, H. Cyber Security Risk Assessment Using Multi Fuzzy Inference System. International Journal of Engineering and Innovative Technology (IJEIT), 2015, no. 8, pp. 13-19.
Glushenko, S. Primenenie sistemy MATLAB dlja ocenki riskov informacionnoj bezopasnosti organizacii [Application of MATLAB to evaluate the risks of the organization of information security]. Biznes-Informatika, 2013, no. 4 (26), pp. 35-42.
Kuksa, P. Metody obuchenija nechetkih system [Methods of teaching fuzzy systems], BMSTU Press, 2004. Access mode: http://pkuksa.org/~pkuksa/ Publications.htm. (Accessed 08.10.2016).
DOI: https://doi.org/10.32620/reks.2017.1.03
Refbacks
- There are currently no refbacks.