Modern vehicles are comparable to desktop computers due to the increase in connectivity. This fact also extends to potential cyber-attacks. A solution for preventing and mitigating …
S Mahmood, A Fouillade, HN Nguyen… - … on Software Testing …, 2020 - ieeexplore.ieee.org
Modern connected cars are exposed to various cybersecurity threats due to the sophisticated computing and connectivity technologies they host for providing enhanced …
Modern cars host numerous special-purpose computing and connectivity devices facilitating the correct functioning of various in-vehicle systems. These devices host complex software …
J Seo, J Kwak, S Kim - IEEE Access, 2024 - ieeexplore.ieee.org
With the advent of autonomous driving and connected vehicles in the automotive industry, various vehicle software components are now connected to wireless networks. This enables …
NMI Chowdhury, R Hasan - 2024 IEEE World Forum on Public …, 2024 - ieeexplore.ieee.org
The rise of autonomous vehicles (AV) has transformed our transportation sectors in recent years. The evolution of technology has made AVs more popular among users. The Over-The …
S Marksteiner, P Priller - 2021 IEEE European Symposium on …, 2021 - ieeexplore.ieee.org
Through international regulations (most prominently the latest UNECE regulation) and standards, the already widely perceived higher need for cybersecurity in automotive systems …
Abstract Over-the-air (OTA) software update system has emerged as an important feature to remotely analyze and upgrade the vehicle inside systems, coordinated by different ECUs …
Z Zhou, Y Matsubara, H Takada - … , Intl Conf on Cloud and Big …, 2021 - ieeexplore.ieee.org
Technological advances are transforming the automotive industry by increasing the number of computer-controlled auto components that provide information to remote systems through …
C Wolschke, B Sangchoolie, J Simon… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Increasing communication and self-driving capabilities for road vehicles lead to threats which could potentially be exploited by attackers. Especially attacks leading to safety …