Login / Signup
Trust and Blame in Self-driving Cars Following a Successful Cyber Attack.
Victoria Marcinkiewicz
Phillip L. Morgan
Published in:
HCI (35) (2023)
Keyphrases
</>
cyber attacks
cyber security
attack detection
cyber defense
countermeasures
trust model
real time
security policies
data mining
computer systems