Evaluating V2V Security on an SDR Testbed.
Geoff TwardokusHanif RahbariPublished in: INFOCOM Workshops (2021)
Keyphrases
- access control
- information security
- security issues
- intrusion detection
- network security
- security policies
- security problems
- computer security
- computer systems
- information assurance
- high security
- malware detection
- data security
- anomaly detection
- smart grid
- key management
- security mechanisms
- security analysis
- security protocols
- functional requirements
- security level
- security requirements
- biometric systems
- smart card
- security vulnerabilities