Adapting Security Policy at Runtime for Connected Autonomous Vehicles.
Hassan LoulouSébastien SaudraisHassan SoubraChérif LarouciPublished in: WETICE (2016)
Keyphrases
- security policies
- autonomous vehicles
- access control
- structured environments
- path planning
- network security
- security management
- obstacle avoidance
- distributed systems
- security requirements
- security concerns
- route planning
- multiagent systems
- robot control
- network management
- access control policies
- mobile robot
- unauthorized access
- home network
- autonomous agents
- ubiquitous computing environments
- stereo vision
- intrusion detection
- complex environments
- multi modal
- access control mechanism
- long range
- control algorithm