Login / Signup
Connected cars - Threats, vulnerabilities and their impact.
Stefanie Strobl
David Hofbauer
Christoph Schmittner
Silia Maksuti
Markus Tauber
Jerker Delsing
Published in:
ICPS (2018)
Keyphrases
</>
countermeasures
information security
security vulnerabilities
security issues
security risks
security breaches
high impact
connected components
decision trees
buffer overflow
search engine
artificial intelligence
data corruption
data mining
intrusion detection
information technology
cyber attacks