Academic literature on the topic 'Voiture connectée'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Voiture connectée.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Voiture connectée":
Girard, M., and D. Malauzat. "Aperçu des moyens de communications utilisés par les usagers d’un centre hospitalier psychiatrique français : fracture numérique ou sociale ?" European Psychiatry 29, S3 (November 2014): 544. http://dx.doi.org/10.1016/j.eurpsy.2014.09.326.
KITOKO, Armand. "INCIDENCE DES RESEAUX SOCIAUX SUR L’EPANOUISSEMENT DE LA CULTURE SCIENTIFIQUE DES ETUDIANTS EN RDC. CAS DE LA VILLE DE KISANGANI." IJRDO - Journal of Social Science and Humanities Research 9, no. 7 (July 27, 2023): 1–9. http://dx.doi.org/10.53555/sshr.v9i7.5775.
BATTU, Daniel. "Voiture connectée." Réseaux Télécommunications, October 2018. http://dx.doi.org/10.51257/a-v1-te7620.
Nummila, Kirsi-Maria. "Lainasanojen vaikutus suomen kirjakielen johtomorfologiaan." Virittäjä 123, no. 2 (June 17, 2019). http://dx.doi.org/10.23982/vir.65375.
Dissertations / Theses on the topic "Voiture connectée":
Ayrault, Maxime. "Dynamic Defenses for Improved Resilience of Connected Cars." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT032.
With the advent of connected cars, new security threats need to be faced. There are mainly two factors that make up the severity of these threats: Firstly, the attack surface is growing with the ever increasing use of software-driven electronic components in the car and especially with every new interface that connects the car to the internet and the outside world. Secondly, the potential impact of security vulnerabilities is growing with the car electronics taking over more and more safety critical functionalities, such as “brake-by-wire” or advanced driver-assistance systems. In the recent years, new attacks have been published that make use of wireless connections in order to take over the control of a car. With these new attack vectors and the growing complexity of the on-board units, safety and security are becoming a major design objective of new automotive systems. The term resilience by design refers to the goal of securing the overall system architecture instead of deploying local security patches. This includes the detection of intrusions or defects and a coordinated protection against these threats. Bio-inspired approaches use the natural resitance of biological organism as a blueprint to propose technical solutions to this challenge. As an example, the principle of a moving target defense is to change the configuration of a system so as to make deterministic attacks impractical. This defense pattern can be observed in many viruses – such as HIV – which are constantly changing the surface proteins exposed to the outside world so as to escape attacks from the immune system. In this project, we would like to study the potential of architectural reconfigurations as means of a moving target defense against cyber attacks and defects in a connected car environment. As a prerequisite for this work, a precise and formal architectural model will be constructed. The main idea is to examine the space of functionally correct configurations of the architecture. In case of a detected intrusion, the system switches in a non-deterministic manner to some remaining configuration. The decision of when and how to trigger a reconfiguration is based on the attack tree: A possible strategy is to keep the system in a state where a maximum number of legal configurations remains in order to be able to react to evolving attacks
Copeland, Rebecca. "Enterprise context‐aware policy solutions for prioritizing service requests and mitigating risk in communications." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0021/document.
This thesis suggests that the enterprise should determine its own connectivity policies and convey them to the network carrier. This allows selecting service delivery options based on business goals, using corporate internal knowledge of users and tasks. The proposed eCAPS (enterprise Context Aware Policy System) allows organizations to distinguish between business and personal requests that are generated by BYOD (Bring Your Own Device) users. This enables enterprises to make policy decisions about resourcing, priority levels, automatic funding and even choice of access networks. By extending the model to evaluated risks, the enterprise could determine mitigating actions for high risk service requests, moderated by business priorities. The network solution utilizes extended 3GPP interfaces, to enable the enterprise to act as a Mobile Virtual Network Operator (MVNO) or as a Sponsor of data services. The proposed ‘Defer‐Back’ feature facilitates deferring personal usage back to the carrier, to be treated as a personal service. The solution contains a Business and Risk model that determines the profile of each service request. This model computes attributes’ inherent values from the Credibility of their sources, which is estimated by their digital characteristics, such as confidence (reliability, data stability), accuracy (error‐management) and precision (resolution and proximity). Corporate policy is injected via multi‐level customizable prioritization, thus combining observations with preferences. To aggregate the evidential information, a new algorithm (Cedar: Corroborative Evidential Diminishing Aggregation Rating) is proposed, which proportionally augments concordant attributes and decrements discordant ones. Cedar satisfies a challenging range of requirements and outperforms popular methods, especially due to its robustness and logical handling of uncertainty and conflict. The proposed multi‐facet eCAPS solution has many applications, of which four are included. Additionally, a case study of an MVNO Automotive is described, which necessitates joining multistakeholders’ policy. The ‘Cedar Credibility Tree’ approach, with corroborative aggregation and measured Credibility, has far reaching utility, especially in behavioral context and diagnosis
Copeland, Rebecca. "Enterprise context‐aware policy solutions for prioritizing service requests and mitigating risk in communications." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0021.
This thesis suggests that the enterprise should determine its own connectivity policies and convey them to the network carrier. This allows selecting service delivery options based on business goals, using corporate internal knowledge of users and tasks. The proposed eCAPS (enterprise Context Aware Policy System) allows organizations to distinguish between business and personal requests that are generated by BYOD (Bring Your Own Device) users. This enables enterprises to make policy decisions about resourcing, priority levels, automatic funding and even choice of access networks. By extending the model to evaluated risks, the enterprise could determine mitigating actions for high risk service requests, moderated by business priorities. The network solution utilizes extended 3GPP interfaces, to enable the enterprise to act as a Mobile Virtual Network Operator (MVNO) or as a Sponsor of data services. The proposed ‘Defer‐Back’ feature facilitates deferring personal usage back to the carrier, to be treated as a personal service. The solution contains a Business and Risk model that determines the profile of each service request. This model computes attributes’ inherent values from the Credibility of their sources, which is estimated by their digital characteristics, such as confidence (reliability, data stability), accuracy (error‐management) and precision (resolution and proximity). Corporate policy is injected via multi‐level customizable prioritization, thus combining observations with preferences. To aggregate the evidential information, a new algorithm (Cedar: Corroborative Evidential Diminishing Aggregation Rating) is proposed, which proportionally augments concordant attributes and decrements discordant ones. Cedar satisfies a challenging range of requirements and outperforms popular methods, especially due to its robustness and logical handling of uncertainty and conflict. The proposed multi‐facet eCAPS solution has many applications, of which four are included. Additionally, a case study of an MVNO Automotive is described, which necessitates joining multistakeholders’ policy. The ‘Cedar Credibility Tree’ approach, with corroborative aggregation and measured Credibility, has far reaching utility, especially in behavioral context and diagnosis
Books on the topic "Voiture connectée":
A, Booksly. Connect the Dots Pour les Enfants de 6 à 8 Ans: Dot to Dot Livres Pour Enfants, Garçons et Filles. le Livre d'activités Idéal Pour les Enfants Avec des Pages Colorées Amusantes et Stimulantes Remplies d'animaux Mignons, de Voitures, de Fleurs, de Vaisse. Lulu.com, 2021.