Login / Signup

Trust and Blame in Self-driving Cars Following a Successful Cyber Attack.

Victoria MarcinkiewiczPhillip L. Morgan
Published in: HCI (35) (2023)
Keyphrases
  • cyber attacks
  • cyber security
  • attack detection
  • cyber defense
  • countermeasures
  • trust model
  • real time
  • security policies
  • data mining
  • computer systems