A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
In recent years, much attention has been paid to autonomous vehicles and security threats on such vehicles have become an important issue. One of these examples is a command injection issue on a gateway ECU, which was reported in 2016. In order to mitigate these threats, the secure design of connect...
Main Authors: | Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2019/4614721 |
Similar Items
-
m94b3f15_002
Published: () -
Ten years of JASO: 1970-1980
by: Edwin Ardener
Published: (1980-01-01) -
Anthropology and missionaries [comments on special issue of JASO 1992 (23:2)]
by: Fiona Bowie
Published: (1993-01-01) -
Malinowski the photographer [comments on T Wright JASO 1991 (22:1) 41-58]
by: Jeremy Coote
Published: (1993-01-01) -
Parkin's evidence [comments on RJ Parkin in JASO 1993 (24:1) 54-63]
by: Georg Pfeffer
Published: (1993-01-01)