Academic literature on the topic 'Car security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Car security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Car security"
Bedarkar, Poonam, and Atul Halmare. "Security System for Car using CAN Protocol." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.
Full textStrandberg, Kim, Tomas Olovsson, and Erland Jonsson. "Securing the Connected Car: A Security-Enhancement Methodology." IEEE Vehicular Technology Magazine 13, no. 1 (March 2018): 56–65. http://dx.doi.org/10.1109/mvt.2017.2758179.
Full textSirichai, Poonsak, Somkuan Kaviya, and Preecha P. Yupapin. "Smart car with security camera for homeland security." Procedia - Social and Behavioral Sciences 2, no. 1 (2010): 58–61. http://dx.doi.org/10.1016/j.sbspro.2010.01.013.
Full textNath, Hirak Jyoti. "Smart Car Prevention and Security." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 2142–46. http://dx.doi.org/10.22214/ijraset.2018.3336.
Full textBeringer, Nicole. "The connected car security boundaries." ATZ worldwide 115, no. 10 (September 14, 2013): 22–27. http://dx.doi.org/10.1007/s38311-013-0111-x.
Full textZhang, De Min. "Elevator Smart Security System." Advanced Materials Research 403-408 (November 2011): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2247.
Full textZuhair, Ahmed, Mansoor Ali, and Ali Al-Humairi. "Intelligent Car Security System Microcontroller based." International Journal of Applied Information Systems 8, no. 3 (February 5, 2015): 7–12. http://dx.doi.org/10.5120/ijais15-451293.
Full textGorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.
Full textAbdullah, Jiwa. "The Design of Mobile Control Car Security System." International Journal of Engineering and Technology 3, no. 3 (2011): 254–62. http://dx.doi.org/10.7763/ijet.2011.v3.234.
Full textLoko, A. Z., A. I. Bugaje, and Usman Abdullahi. "Microcontroller Based Smart Card Car Security System." International Journal of Engineering Trends and Technology 29, no. 3 (November 25, 2015): 150–53. http://dx.doi.org/10.14445/22315381/ijett-v29p228.
Full textDissertations / Theses on the topic "Car security"
Svensson, Benjamin, and Kristian Varnai. "Servicing a Connected Car Service." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.
Full textBerner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.
Full textIoT-produkter bryter ny mark inom spridda branscher, och introducerar potentiella attackvektorer i oförberedda miljöer. Det är inte förvånande att till och med den nya generationen garageöppnare har tagit ett kliv in i världen av IoT. Vilket innebär att garageöppnarna är uppkopplade till Internet, kallas för smarta garage och levereras med målet att bidra till ökad säkerhet med sina nya funktioner tagna från trenden av hemmaövervakning. Men kan de hålla vad de lovar? Det här examensarbetet har utvärderat säkerheten av ett utvalt smart garage som säljs världen över – iSmartgate PRO. Penetrationstestning genomfördes med fokus på webbapplikationen. Totalt sett rapporterades elva sårbarheter, varav en inkluderade en one-click-root-attack som kombinerade tre sårbarheter till att ge en icke autentisierad fjärrangripare ett root-skal. Den dragna slutsatsen var att produkten hade utrymme för att förbättra säkerheten.
Bouard, Alexandre [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Refik [Akademischer Betreuer] Molva. "Middleware-based Security for Future In-Car Networks / Alexandre Bouard. Gutachter: Claudia Eckert ; Refik Molva. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1058214268/34.
Full textRamquist, Robin. "Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128612.
Full textSemančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.
Full textЛевченко, Віталій Михайлович. "Пристрій активної безпеки автомобіля." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/25876.
Full textThe purpose of the master's thesis is to improve the parameters and characteristics of active safety of the car and extend its application. The objectives of the study are: an analytical review of existing car security systems; development of the automobile safety device and its simulation; research and analysis of characteristics of the designed device. the object of research - a device for reducing the probability of road traffic accidents and ensuring the safety of passengers of the car. subject of research - parameters and characteristics of the device and active safety systems of the car on its basis. research methods: theoretical calculation and experimental study of parameters of the device layout. scientific novelty of the obtained results: the use of the device of automobile safety with the presented algorithm of work is offered and researched. approbation of the results of the dissertation. International Scientific Internet Conference "Information Society: Technological, Economic and Technical Aspects of Formation" (Issue 32, October 16, 2018).
Pirner, Adam. "Vyprošťování osob z havarovaných vozidel s ohledem na jejich konstrukci." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232682.
Full textČtvrtečka, Lukáš. "Podnikatelský plán." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72730.
Full textGoikoetxea, Yanci Asier. "Smart card security." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3091/.
Full textBengtsson, Robin. "Security creating technology for elderly care." Thesis, Tekniska Högskolan, Jönköping University, JTH, Industridesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50760.
Full textBooks on the topic "Car security"
Webb, Barry. Preventing car crime in car parks. London: Home Office, Crime Prevention Unit, 1992.
Find full textStanding Conference on Crime Prevention. Working Group on Car Security. Report of the Working Group on Car Security. [London]: Home Office, 1985.
Find full textBorder-Lands USA: [or, how to protect the country by car]. Miami Beach, FL: Earthdog Press, 2014.
Find full textSouthall, Dean. Designing for vehicle security: Towards a crime free car. London: Home Office, 1985.
Find full textStübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1.
Full textPhillips, Bill. Home mechanix guide to security: Protecting your home, car & family. New York: Wiley, 1994.
Find full textHome security: How to select reliable locks and alarms for your home, office, or car. Boulder, Colo: Paladin Press, 2001.
Find full textSecurity systems simplified: Protecting your home, business, and car with state-of-the-art burglar alarms. Boulder, Colo: Paladin Press, 1992.
Find full textUnderstanding car parks, crime, and CCTV: Evaluation lessons from safer cities. London: Home Office Police Dept., 1993.
Find full textStübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer. Wiesbaden: Springer Fachmedien Wiesbaden, 2013.
Find full textBook chapters on the topic "Car security"
Mansor, Hafizah, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian. "Log Your Car: Reliable Maintenance Services Record." In Information Security and Cryptology, 484–504. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_30.
Full textKurunathan, Harrison, Ricardo Severino, Ênio Filho, and Eduardo Tovar. "WiCAR - Simulating Towards the Wireless Car." In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 136–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55583-2_10.
Full textBella, Giampaolo, Pietro Biondi, and Giuseppe Tudisco. "Car Drivers’ Privacy Concerns and Trust Perceptions." In Trust, Privacy and Security in Digital Business, 143–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86586-3_10.
Full textStübing, Hagen. "Physical Layer Security: Secure Car-to-X Beamforming." In Multilayered Security and Privacy Protection in Car-to-X Networks, 131–68. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1_6.
Full textZhang, Xing, and Liang Zhou. "Classification of Car Scratch Types Based on Optimized BP Neural Network." In Cloud Computing and Security, 148–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_14.
Full textSymeonidis, Iraklis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart Mennink, Siemen Dhooghe, and Bart Preneel. "SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision." In Computer Security – ESORICS 2017, 475–93. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66399-9_26.
Full textPalma, Lucas M., Fernanda O. Gomes, Martín Vigil, and Jean E. Martina. "A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs." In Information Systems Security, 3–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_1.
Full textLi, Duohui, Sisi Tan, Jianzhi Zhang, and Wangdong Jiang. "Hungarian Method in a Car-Sharing System Application Research." In Advances in Artificial Intelligence and Security, 265–75. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_21.
Full textFraneková, Mária, and Peter Lüley. "Security of Digital Signature Schemes for Car-to-Car Communications within Intelligent Transportation Systems." In Communications in Computer and Information Science, 258–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41647-7_32.
Full textShin, Yong-Yoon, and Byung-Yun Lee. "A Study for Car Insurance Service Using Vehicle Real Time Information." In IT Convergence and Security 2012, 241–46. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_28.
Full textConference papers on the topic "Car security"
Park, Jaehyun, Hongjin Kim, Junbo Shim, Junseok Kim, Hojin Lee, Jaeyoon Kim, Hongkyo Kim, Hayeon Ra, and Sungjin Hong. "Study of Car Dash Cam Security Vulnerabilities." In the 4th International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/3026724.3026732.
Full textJacob, Aleesha Susan, Vandita Chaurasiya, Vagmayee Sharda, and Shubhra Dixit. "Car surveillance security system." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203640.
Full textGlas, Benjamin, Oliver Sander, Vitali Stuckert, Klaus D. Muller-Glaser, and Jurgen Becker. "Car-to-Car Communication Security on Reconfigurable Hardware." In 2009 IEEE 69th Vehicular Technology Conference Spring. IEEE, 2009. http://dx.doi.org/10.1109/vetecs.2009.5073433.
Full textMahesh, E. Kiran, Piyush C. Jagadale, and B. Karthikeyan. "Advanced Security System for Car." In 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529422.
Full textSehgal, Vivek Kumar, Soumitra Mehrotra, and Harshit Marwah. "Car security using Internet of Things." In 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES). IEEE, 2016. http://dx.doi.org/10.1109/icpeices.2016.7853207.
Full textRashidi, F. R. M., M. H. Ariff, and M. Z. Ibrahim. "Car monitoring using Bluetooth security system." In 2011 International Conference on Electrical, Control and Computer Engineering (INECCE). IEEE, 2011. http://dx.doi.org/10.1109/inecce.2011.5953919.
Full textKhurram, Muzaffar, Hemanth Kumar, Adi Chandak, Varun Sarwade, Nitu Arora, and Tony Quach. "Enhancing connected car adoption: Security framework." In 2016 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2016. http://dx.doi.org/10.1109/iccve.2016.5.
Full textSingandhupe, Ashutosh, and Hung Manh La. "MCC-EKF for Autonomous Car Security." In 2020 Fourth IEEE International Conference on Robotic Computing (IRC). IEEE, 2020. http://dx.doi.org/10.1109/irc.2020.00056.
Full textLuo, Feng, Zhaojing Zhang, Yifei Ma, and Qiujian Li. "Security Mechanism for Digital Car Key." In 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2021. http://dx.doi.org/10.1109/ccet52649.2021.9544216.
Full textSteinvall, Ove, Stig Sandberg, Ulf Hörberg, Rolf Persson, Folke Berglund, Kjell Karslsson, Johan Öhgren, Zhaohua Yu, and Per Söderberg. "Laser dazzling impacts on car driver performance." In SPIE Security + Defence, edited by David H. Titterton, Mark A. Richardson, Robert J. Grasso, Harro Ackermann, and Willy L. Bohn. SPIE, 2013. http://dx.doi.org/10.1117/12.2028505.
Full textReports on the topic "Car security"
Baudais, Virginie, Annelies Hickendorff, Jaïr van der Lijn, Igor Acko, Souleymane Maiga, and Hussein Yusuf Ali. EU Military Training Missions: A Synthesis Report. Stockholm International Peace Research Institute, May 2022. http://dx.doi.org/10.55163/lfle9658.
Full textRazdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.
Full textWilson, Elizabeth F. Homeland Security - Can It be Done? Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415743.
Full textGay, John E. Green Peace: Can Biofuels Accelerate Energy Security. Fort Belvoir, VA: Defense Technical Information Center, February 2013. http://dx.doi.org/10.21236/ad1018855.
Full textCutrera, Fillipo. Do the BRICS care about International Security? E-papers Servicos Editoriais Ltda, January 2019. http://dx.doi.org/10.48207/23181818/pb0902.
Full textThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Full textBohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, February 2020. http://dx.doi.org/10.32468/be.1103.
Full textDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.
Full textHoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, December 2021. http://dx.doi.org/10.51593/2021ca007.
Full textAlbers, Paul J. Can Peacekeeping and Security Assistance Co-Exist? A Bosnia Case Study. Fort Belvoir, VA: Defense Technical Information Center, May 1997. http://dx.doi.org/10.21236/ada328188.
Full text