Cargando…
Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine
In a connected car, the vehicle’s internal network is connected to the outside through communication technology. However, this can cause new security vulnerabilities. In particular, V2X communication, to provide the safety of connected cars, can directly threaten the lives of passengers if a securit...
Autores principales: | Lee, Dae-Hwi, Kim, Chan-Min, Song, Hyun-Seok, Lee, Yong-Hee, Chung, Won-Sun |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9920388/ https://www.ncbi.nlm.nih.gov/pubmed/36772463 http://dx.doi.org/10.3390/s23031421 |
Ejemplares similares
-
Machine Learning for Cybersecurity Cookbook
por: Tsukerman, Emmanuel
Publicado: (2019) -
Emulating and Evaluating Virtual Remote Laboratories for Cybersecurity †
por: Robles-Gómez, Antonio, et al.
Publicado: (2020) -
Data mining and machine learning in cybersecurity
por: Dua, Sumeet, et al.
Publicado: (2011) -
Data Mining and Machine Learning in Cybersecurity
por: Dua, Sumeet
Publicado: (2016) -
Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
por: Hadlington, Lee
Publicado: (2017)