Securing the Connected Car: A Security-Enhancement Methodology.
Kim StrandbergTomas OlovssonErland JonssonPublished in: IEEE Veh. Technol. Mag. (2018)
Keyphrases
- information security
- access control
- intrusion detection
- information assurance
- network security
- computer security
- security policies
- countermeasures
- security issues
- high assurance
- image enhancement
- design methodology
- identity management
- security systems
- security requirements
- statistical databases
- information systems
- security protocols
- data security
- database
- case study