Formalising systematic security evaluations using attack trees for automotive applications

M Cheah, HN Nguyen, J Bryans, SA Shaikh - Information Security Theory …, 2018 - Springer
Vehicles are insecure. To protect such systems, we must begin by identifying any
weaknesses. One approach is to apply a systematic security evaluation to the system under …

Intra-Vehicle Connectivity: Case study and channel characterization

A Sellergren - 2018 - diva-portal.org
The purpose of this thesis was to investigate the feasibility of a wireless architectural
approach for intra-vehicle communications. The current wired architecture was compared to …