Добірка наукової літератури з теми "Car security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Car security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Car security"
Bedarkar, Poonam, and Atul Halmare. "Security System for Car using CAN Protocol." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.
Повний текст джерелаStrandberg, Kim, Tomas Olovsson, and Erland Jonsson. "Securing the Connected Car: A Security-Enhancement Methodology." IEEE Vehicular Technology Magazine 13, no. 1 (March 2018): 56–65. http://dx.doi.org/10.1109/mvt.2017.2758179.
Повний текст джерелаSirichai, Poonsak, Somkuan Kaviya, and Preecha P. Yupapin. "Smart car with security camera for homeland security." Procedia - Social and Behavioral Sciences 2, no. 1 (2010): 58–61. http://dx.doi.org/10.1016/j.sbspro.2010.01.013.
Повний текст джерелаNath, Hirak Jyoti. "Smart Car Prevention and Security." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 2142–46. http://dx.doi.org/10.22214/ijraset.2018.3336.
Повний текст джерелаBeringer, Nicole. "The connected car security boundaries." ATZ worldwide 115, no. 10 (September 14, 2013): 22–27. http://dx.doi.org/10.1007/s38311-013-0111-x.
Повний текст джерелаZhang, De Min. "Elevator Smart Security System." Advanced Materials Research 403-408 (November 2011): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2247.
Повний текст джерелаZuhair, Ahmed, Mansoor Ali, and Ali Al-Humairi. "Intelligent Car Security System Microcontroller based." International Journal of Applied Information Systems 8, no. 3 (February 5, 2015): 7–12. http://dx.doi.org/10.5120/ijais15-451293.
Повний текст джерелаGorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.
Повний текст джерелаAbdullah, Jiwa. "The Design of Mobile Control Car Security System." International Journal of Engineering and Technology 3, no. 3 (2011): 254–62. http://dx.doi.org/10.7763/ijet.2011.v3.234.
Повний текст джерелаLoko, A. Z., A. I. Bugaje, and Usman Abdullahi. "Microcontroller Based Smart Card Car Security System." International Journal of Engineering Trends and Technology 29, no. 3 (November 25, 2015): 150–53. http://dx.doi.org/10.14445/22315381/ijett-v29p228.
Повний текст джерелаДисертації з теми "Car security"
Svensson, Benjamin, and Kristian Varnai. "Servicing a Connected Car Service." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.
Повний текст джерелаBerner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.
Повний текст джерелаIoT-produkter bryter ny mark inom spridda branscher, och introducerar potentiella attackvektorer i oförberedda miljöer. Det är inte förvånande att till och med den nya generationen garageöppnare har tagit ett kliv in i världen av IoT. Vilket innebär att garageöppnarna är uppkopplade till Internet, kallas för smarta garage och levereras med målet att bidra till ökad säkerhet med sina nya funktioner tagna från trenden av hemmaövervakning. Men kan de hålla vad de lovar? Det här examensarbetet har utvärderat säkerheten av ett utvalt smart garage som säljs världen över – iSmartgate PRO. Penetrationstestning genomfördes med fokus på webbapplikationen. Totalt sett rapporterades elva sårbarheter, varav en inkluderade en one-click-root-attack som kombinerade tre sårbarheter till att ge en icke autentisierad fjärrangripare ett root-skal. Den dragna slutsatsen var att produkten hade utrymme för att förbättra säkerheten.
Bouard, Alexandre [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Refik [Akademischer Betreuer] Molva. "Middleware-based Security for Future In-Car Networks / Alexandre Bouard. Gutachter: Claudia Eckert ; Refik Molva. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1058214268/34.
Повний текст джерелаRamquist, Robin. "Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128612.
Повний текст джерелаSemančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.
Повний текст джерелаЛевченко, Віталій Михайлович. "Пристрій активної безпеки автомобіля". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/25876.
Повний текст джерелаThe purpose of the master's thesis is to improve the parameters and characteristics of active safety of the car and extend its application. The objectives of the study are: an analytical review of existing car security systems; development of the automobile safety device and its simulation; research and analysis of characteristics of the designed device. the object of research - a device for reducing the probability of road traffic accidents and ensuring the safety of passengers of the car. subject of research - parameters and characteristics of the device and active safety systems of the car on its basis. research methods: theoretical calculation and experimental study of parameters of the device layout. scientific novelty of the obtained results: the use of the device of automobile safety with the presented algorithm of work is offered and researched. approbation of the results of the dissertation. International Scientific Internet Conference "Information Society: Technological, Economic and Technical Aspects of Formation" (Issue 32, October 16, 2018).
Pirner, Adam. "Vyprošťování osob z havarovaných vozidel s ohledem na jejich konstrukci." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232682.
Повний текст джерелаČtvrtečka, Lukáš. "Podnikatelský plán." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72730.
Повний текст джерелаGoikoetxea, Yanci Asier. "Smart card security." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3091/.
Повний текст джерелаBengtsson, Robin. "Security creating technology for elderly care." Thesis, Tekniska Högskolan, Jönköping University, JTH, Industridesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50760.
Повний текст джерелаКниги з теми "Car security"
Webb, Barry. Preventing car crime in car parks. London: Home Office, Crime Prevention Unit, 1992.
Знайти повний текст джерелаStanding Conference on Crime Prevention. Working Group on Car Security. Report of the Working Group on Car Security. [London]: Home Office, 1985.
Знайти повний текст джерелаBorder-Lands USA: [or, how to protect the country by car]. Miami Beach, FL: Earthdog Press, 2014.
Знайти повний текст джерелаSouthall, Dean. Designing for vehicle security: Towards a crime free car. London: Home Office, 1985.
Знайти повний текст джерелаStübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1.
Повний текст джерелаPhillips, Bill. Home mechanix guide to security: Protecting your home, car & family. New York: Wiley, 1994.
Знайти повний текст джерелаHome security: How to select reliable locks and alarms for your home, office, or car. Boulder, Colo: Paladin Press, 2001.
Знайти повний текст джерелаSecurity systems simplified: Protecting your home, business, and car with state-of-the-art burglar alarms. Boulder, Colo: Paladin Press, 1992.
Знайти повний текст джерелаUnderstanding car parks, crime, and CCTV: Evaluation lessons from safer cities. London: Home Office Police Dept., 1993.
Знайти повний текст джерелаStübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer. Wiesbaden: Springer Fachmedien Wiesbaden, 2013.
Знайти повний текст джерелаЧастини книг з теми "Car security"
Mansor, Hafizah, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian. "Log Your Car: Reliable Maintenance Services Record." In Information Security and Cryptology, 484–504. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_30.
Повний текст джерелаKurunathan, Harrison, Ricardo Severino, Ênio Filho, and Eduardo Tovar. "WiCAR - Simulating Towards the Wireless Car." In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 136–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55583-2_10.
Повний текст джерелаBella, Giampaolo, Pietro Biondi, and Giuseppe Tudisco. "Car Drivers’ Privacy Concerns and Trust Perceptions." In Trust, Privacy and Security in Digital Business, 143–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86586-3_10.
Повний текст джерелаStübing, Hagen. "Physical Layer Security: Secure Car-to-X Beamforming." In Multilayered Security and Privacy Protection in Car-to-X Networks, 131–68. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1_6.
Повний текст джерелаZhang, Xing, and Liang Zhou. "Classification of Car Scratch Types Based on Optimized BP Neural Network." In Cloud Computing and Security, 148–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_14.
Повний текст джерелаSymeonidis, Iraklis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart Mennink, Siemen Dhooghe, and Bart Preneel. "SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision." In Computer Security – ESORICS 2017, 475–93. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66399-9_26.
Повний текст джерелаPalma, Lucas M., Fernanda O. Gomes, Martín Vigil, and Jean E. Martina. "A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs." In Information Systems Security, 3–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_1.
Повний текст джерелаLi, Duohui, Sisi Tan, Jianzhi Zhang, and Wangdong Jiang. "Hungarian Method in a Car-Sharing System Application Research." In Advances in Artificial Intelligence and Security, 265–75. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_21.
Повний текст джерелаFraneková, Mária, and Peter Lüley. "Security of Digital Signature Schemes for Car-to-Car Communications within Intelligent Transportation Systems." In Communications in Computer and Information Science, 258–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41647-7_32.
Повний текст джерелаShin, Yong-Yoon, and Byung-Yun Lee. "A Study for Car Insurance Service Using Vehicle Real Time Information." In IT Convergence and Security 2012, 241–46. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_28.
Повний текст джерелаТези доповідей конференцій з теми "Car security"
Park, Jaehyun, Hongjin Kim, Junbo Shim, Junseok Kim, Hojin Lee, Jaeyoon Kim, Hongkyo Kim, Hayeon Ra, and Sungjin Hong. "Study of Car Dash Cam Security Vulnerabilities." In the 4th International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/3026724.3026732.
Повний текст джерелаJacob, Aleesha Susan, Vandita Chaurasiya, Vagmayee Sharda, and Shubhra Dixit. "Car surveillance security system." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203640.
Повний текст джерелаGlas, Benjamin, Oliver Sander, Vitali Stuckert, Klaus D. Muller-Glaser, and Jurgen Becker. "Car-to-Car Communication Security on Reconfigurable Hardware." In 2009 IEEE 69th Vehicular Technology Conference Spring. IEEE, 2009. http://dx.doi.org/10.1109/vetecs.2009.5073433.
Повний текст джерелаMahesh, E. Kiran, Piyush C. Jagadale, and B. Karthikeyan. "Advanced Security System for Car." In 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529422.
Повний текст джерелаSehgal, Vivek Kumar, Soumitra Mehrotra, and Harshit Marwah. "Car security using Internet of Things." In 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES). IEEE, 2016. http://dx.doi.org/10.1109/icpeices.2016.7853207.
Повний текст джерелаRashidi, F. R. M., M. H. Ariff, and M. Z. Ibrahim. "Car monitoring using Bluetooth security system." In 2011 International Conference on Electrical, Control and Computer Engineering (INECCE). IEEE, 2011. http://dx.doi.org/10.1109/inecce.2011.5953919.
Повний текст джерелаKhurram, Muzaffar, Hemanth Kumar, Adi Chandak, Varun Sarwade, Nitu Arora, and Tony Quach. "Enhancing connected car adoption: Security framework." In 2016 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2016. http://dx.doi.org/10.1109/iccve.2016.5.
Повний текст джерелаSingandhupe, Ashutosh, and Hung Manh La. "MCC-EKF for Autonomous Car Security." In 2020 Fourth IEEE International Conference on Robotic Computing (IRC). IEEE, 2020. http://dx.doi.org/10.1109/irc.2020.00056.
Повний текст джерелаLuo, Feng, Zhaojing Zhang, Yifei Ma, and Qiujian Li. "Security Mechanism for Digital Car Key." In 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2021. http://dx.doi.org/10.1109/ccet52649.2021.9544216.
Повний текст джерелаSteinvall, Ove, Stig Sandberg, Ulf Hörberg, Rolf Persson, Folke Berglund, Kjell Karslsson, Johan Öhgren, Zhaohua Yu, and Per Söderberg. "Laser dazzling impacts on car driver performance." In SPIE Security + Defence, edited by David H. Titterton, Mark A. Richardson, Robert J. Grasso, Harro Ackermann, and Willy L. Bohn. SPIE, 2013. http://dx.doi.org/10.1117/12.2028505.
Повний текст джерелаЗвіти організацій з теми "Car security"
Baudais, Virginie, Annelies Hickendorff, Jaïr van der Lijn, Igor Acko, Souleymane Maiga, and Hussein Yusuf Ali. EU Military Training Missions: A Synthesis Report. Stockholm International Peace Research Institute, May 2022. http://dx.doi.org/10.55163/lfle9658.
Повний текст джерелаRazdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.
Повний текст джерелаWilson, Elizabeth F. Homeland Security - Can It be Done? Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415743.
Повний текст джерелаGay, John E. Green Peace: Can Biofuels Accelerate Energy Security. Fort Belvoir, VA: Defense Technical Information Center, February 2013. http://dx.doi.org/10.21236/ad1018855.
Повний текст джерелаCutrera, Fillipo. Do the BRICS care about International Security? E-papers Servicos Editoriais Ltda, January 2019. http://dx.doi.org/10.48207/23181818/pb0902.
Повний текст джерелаThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Повний текст джерелаBohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, February 2020. http://dx.doi.org/10.32468/be.1103.
Повний текст джерелаDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.
Повний текст джерелаHoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, December 2021. http://dx.doi.org/10.51593/2021ca007.
Повний текст джерелаAlbers, Paul J. Can Peacekeeping and Security Assistance Co-Exist? A Bosnia Case Study. Fort Belvoir, VA: Defense Technical Information Center, May 1997. http://dx.doi.org/10.21236/ada328188.
Повний текст джерела