A survey on cyber security of CAV
With the ever fast developments of technologies in science and engineering, it is believed that CAV (connected and autonomous vehicles) will come into our daily life soon. CAV could be used in many different aspects in our lives such as public transportation and agriculture, and so on. Although CAV...
| Main Authors: | He, Qiyi, Meng, Xiaolin, Qu, Rong |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/44921/ |
Similar Items
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
Small states and the strategic utility of cyber capabilities
by: Domingo, Francis Rico
Published: (2018)
by: Domingo, Francis Rico
Published: (2018)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Allocating patrolling resources to effectively thwart intelligent attackers
by: Lowbridge, Thomas
Published: (2021)
by: Lowbridge, Thomas
Published: (2021)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
The use of advanced communications and internet technology in car transportation to facilitate improvements for both driver and passengers
by: Saftah, Rehab Omar
Published: (2015)
by: Saftah, Rehab Omar
Published: (2015)
Event handling for distributed real-time cyber-physical systems
by: Singh, Jaipal, et al.
Published: (2012)
by: Singh, Jaipal, et al.
Published: (2012)
Exploring personalised autonomous vehicles to influence user trust
by: Sun, Xu, et al.
Published: (2020)
by: Sun, Xu, et al.
Published: (2020)
A perspective on the applications of energy-cyber-physical systems (e-CPSs) in ultra-low emission coal-fired power plants
by: Zhao, Haitao, et al.
Published: (2019)
by: Zhao, Haitao, et al.
Published: (2019)
Driver prediction model for autonomous vehicle within a virtual testing platform tailored to Malaysia driving scenarios
by: Cheok, Jun Hong
Published: (2025)
by: Cheok, Jun Hong
Published: (2025)
Driver take-over reaction in autonomous vehicles with rotatable seats
by: Cao, Shi, et al.
Published: (2020)
by: Cao, Shi, et al.
Published: (2020)
Applying the Theory of Planned Behaviour to predicting online safety behaviour
by: Burns, Sarah, et al.
Published: (2013)
by: Burns, Sarah, et al.
Published: (2013)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
An integrated system for autonomous robotics manipulation
by: Bagnell, A, et al.
Published: (2012)
by: Bagnell, A, et al.
Published: (2012)
Autonomous vehicles and their interaction with section 2(1) of the Consumer Protection Act 1987
by: Hawkey, Didier Tuscan
Published: (2024)
by: Hawkey, Didier Tuscan
Published: (2024)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Multi road marking detection system for autonomous car using hybrid- based method
by: Shah, Khan Bahadur
Published: (2018)
by: Shah, Khan Bahadur
Published: (2018)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
The cognitive and socio-demographic influences on driving performance and driving cessation in post-stroke drivers
by: Blane, Alison, et al.
Published: (2015)
by: Blane, Alison, et al.
Published: (2015)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Molecular Characterization of Chicken Anemia Virus (CAV) and Expression of the CAV VP3 Protein
by: Mohtar, Siti Hasmah
Published: (2003)
by: Mohtar, Siti Hasmah
Published: (2003)
Modular Autonomous Robotics Platform for Educational Use
by: Ortega-Sanchez, Cesar, et al.
Published: (2010)
by: Ortega-Sanchez, Cesar, et al.
Published: (2010)
Understanding the ‘Look but Fail to See’ Error
by: Robbins, Chloe J.
Published: (2019)
by: Robbins, Chloe J.
Published: (2019)
Post-stroke driving: Examining the effect of executive dysfunction
by: Motta, Karen, et al.
Published: (2014)
by: Motta, Karen, et al.
Published: (2014)
Post-stroke driving: Examining the effect of executive dysfunction
by: Motta, Karen, et al.
Published: (2014)
by: Motta, Karen, et al.
Published: (2014)
A shortened version of the Dementia Drivers’ Screening Assessment
by: Lincoln, Nadina, et al.
Published: (2014)
by: Lincoln, Nadina, et al.
Published: (2014)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation
by: Muslim, Farah Kamil Abid
Published: (2017)
by: Muslim, Farah Kamil Abid
Published: (2017)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
Predicting fitness to drive of people with dementia in Iraq
by: Rashid, Roshe
Published: (2020)
by: Rashid, Roshe
Published: (2020)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Similar Items
-
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012) -
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017) -
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023) -
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021) -
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)