Добірка наукової літератури з теми "Car security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Car security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Car security"

1

Bedarkar, Poonam, and Atul Halmare. "Security System for Car using CAN Protocol." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Strandberg, Kim, Tomas Olovsson, and Erland Jonsson. "Securing the Connected Car: A Security-Enhancement Methodology." IEEE Vehicular Technology Magazine 13, no. 1 (March 2018): 56–65. http://dx.doi.org/10.1109/mvt.2017.2758179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sirichai, Poonsak, Somkuan Kaviya, and Preecha P. Yupapin. "Smart car with security camera for homeland security." Procedia - Social and Behavioral Sciences 2, no. 1 (2010): 58–61. http://dx.doi.org/10.1016/j.sbspro.2010.01.013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nath, Hirak Jyoti. "Smart Car Prevention and Security." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 2142–46. http://dx.doi.org/10.22214/ijraset.2018.3336.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Beringer, Nicole. "The connected car security boundaries." ATZ worldwide 115, no. 10 (September 14, 2013): 22–27. http://dx.doi.org/10.1007/s38311-013-0111-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhang, De Min. "Elevator Smart Security System." Advanced Materials Research 403-408 (November 2011): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2247.

Повний текст джерела
Анотація:
The elevator smart security system provides a good method to access the elevator car buttons. It uses contactless smart card to active the car buttons. Only after brushing the authorized card, the car buttons can be selected, so the passenger can take the elevator to his home floor. Visitor can take the elevator via a visitor automatic controller not using card.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zuhair, Ahmed, Mansoor Ali, and Ali Al-Humairi. "Intelligent Car Security System Microcontroller based." International Journal of Applied Information Systems 8, no. 3 (February 5, 2015): 7–12. http://dx.doi.org/10.5120/ijais15-451293.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.

Повний текст джерела
Анотація:
The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders completely unintentionally, for example by adding an interesting feature to the car system, and then this feature can be dual due to problems with the authentication system. Therefore, based on this, car security systems must have the highest level of authentication security, which requires the use of a decentralized blockchain network with nodes for each car, authenticating the user in groups, this will move away from the standard client-server architecture, which is not sufficiently secure. . The main ways to solve this problem are to build a comprehensive security system, which in turn includes an improved and reliable authentication measure based on a decentralized blockchain network and two comprehensive schemes to update the critical data transmission system of the car – CAN network. The use of these systems will improve the security of the identification system and information flowing between critical units, which will improve the safety of the car from theft, as well as from the ability of attackers to create emergencies remotely.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Abdullah, Jiwa. "The Design of Mobile Control Car Security System." International Journal of Engineering and Technology 3, no. 3 (2011): 254–62. http://dx.doi.org/10.7763/ijet.2011.v3.234.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Loko, A. Z., A. I. Bugaje, and Usman Abdullahi. "Microcontroller Based Smart Card Car Security System." International Journal of Engineering Trends and Technology 29, no. 3 (November 25, 2015): 150–53. http://dx.doi.org/10.14445/22315381/ijett-v29p228.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Car security"

1

Svensson, Benjamin, and Kristian Varnai. "Servicing a Connected Car Service." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.

Повний текст джерела
Анотація:
Increased wireless connectivity to vehicles invites both existing and new digital methods of attack, requiring the high prioritisation of security throughout the development of not just the vehicle, but also the services provided for it. This report examines such a connected car service used by thousands of customers every day and evaluates it from a security standpoint. The methods used for this evaluation include both direct testing of vulnerabilities, as well as the examination of design choices made which more broadly affect the system as a whole. With the results are included suggestions for solutions where necessary, and in the conclusion, design pitfalls and general considerations for system development are discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Berner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.

Повний текст джерела
Анотація:
IoT products are breaking new ground into widespread industries and introducing potential attack vectors to unprepared environments. Even the new generation of garage openers, called smart garages, have entered into the world of IoT. They are connected to the Internet, and are delivered with the goal of providing more security by merging features from the home surveillance boom. But do they keep what they promise? This thesis has evaluated the security of one particular smart garage that is being sold worldwide – iSmartgate PRO. Penetration testing was conducted with focus on the web application. A total of eleven vulnerabilities were reported, including a one-click-root attack that combined three of them into providing an unauthenticated remote attacker with a root shell. It was concluded that the product lacked security measures in certain areas.
IoT-produkter bryter ny mark inom spridda branscher, och introducerar potentiella attackvektorer i oförberedda miljöer. Det är inte förvånande att till och med den nya generationen garageöppnare har tagit ett kliv in i världen av IoT. Vilket innebär att garageöppnarna är uppkopplade till Internet, kallas för smarta garage och levereras med målet att bidra till ökad säkerhet med sina nya funktioner tagna från trenden av hemmaövervakning. Men kan de hålla vad de lovar? Det här examensarbetet har utvärderat säkerheten av ett utvalt smart garage som säljs världen över – iSmartgate PRO. Penetrationstestning genomfördes med fokus på webbapplikationen. Totalt sett rapporterades elva sårbarheter, varav en inkluderade en one-click-root-attack som kombinerade tre sårbarheter till att ge en icke autentisierad fjärrangripare ett root-skal. Den dragna slutsatsen var att produkten hade utrymme för att förbättra säkerheten.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bouard, Alexandre [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Refik [Akademischer Betreuer] Molva. "Middleware-based Security for Future In-Car Networks / Alexandre Bouard. Gutachter: Claudia Eckert ; Refik Molva. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1058214268/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ramquist, Robin. "Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128612.

Повний текст джерела
Анотація:
The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and interviews with people in the car industry and IT-security are made. Not much research have been done about the security of IoT connected cars in general due to its infancy. Most previous research has been done for not IoT connected cars. This lack of research made security solutions for other IoT devices interesting to take inspiration from and was then used to form security proposals that cover multiple technologies used in the car industry and other industries.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Semančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.

Повний текст джерела
Анотація:
This thesis deals with car remote keyless systems, analysis of these systems and most common attacks on these systems. It also deals with design and realisation of secure car remote keyless system, which should be resistant to said attacks, and with design and realisation of attack against existing car remote keyless system.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Левченко, Віталій Михайлович. "Пристрій активної безпеки автомобіля". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/25876.

Повний текст джерела
Анотація:
Метою магістерської дисертації є покращення параметрів та характеристик активної безпеки автомобіля та розширення її застосування. Задачами дослідження є: аналітичний огляд існуючих систем безпеки автомобіля; розробка пристрою автомобільної безпеки та виконання його моделювання; дослідження та аналіз характеристик спроектованого пристрою. – об’єкт дослідження — пристрій для зменшення вірогідності дорожньо-транспортної пригоди та забезпечення безпеки пасажирам автомобіля. – предмет дослідження — параметри та характеристики пристрою та систем активної безпеки автомобіля на його основі. – методи дослідження: теоретичний розрахунок та експериментальне дослідження параметрів макету пристрою. – наукова новизна одержаних результатів: запропоновано та досліджено використання пристрою автомобільної безпеки з представленим алгоритмом роботи. – апробація результатів дисертації. міжнародна наукова інтернет–конференція «Інформаційне суспільство: технологічні, економічні та технічні аспекти становлення» (Випуск 32, 16 жовтня 2018р).
The purpose of the master's thesis is to improve the parameters and characteristics of active safety of the car and extend its application. The objectives of the study are: an analytical review of existing car security systems; development of the automobile safety device and its simulation; research and analysis of characteristics of the designed device.  the object of research - a device for reducing the probability of road traffic accidents and ensuring the safety of passengers of the car.  subject of research - parameters and characteristics of the device and active safety systems of the car on its basis.  research methods: theoretical calculation and experimental study of parameters of the device layout.  scientific novelty of the obtained results: the use of the device of automobile safety with the presented algorithm of work is offered and researched.  approbation of the results of the dissertation. International Scientific Internet Conference "Information Society: Technological, Economic and Technical Aspects of Formation" (Issue 32, October 16, 2018).
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Pirner, Adam. "Vyprošťování osob z havarovaných vozidel s ohledem na jejich konstrukci." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232682.

Повний текст джерела
Анотація:
This thesis deals with the topic of extrication of people trapped incrashed vehicles regarding the construction of the vehicle. Part of the resources needed for this theses was taken from a literary survey drawn up with the help of the Research and scientific library in Hradec Králové according to the given topic and key phrases. The first part of the thesis deals with specific parts of the constructions of cars. This part is followed by description of road accidents, various kinds of accidents and possible deformations of cars after accidents. The thesis deals with extrication itself made by fire brigades, suitable procedures, kinds of interventions and means of used technical equipment. Another part suggests ways of saving trails and evidence during road accident interventions. Final part of the thesis is focused on overall analysis of the given problem based on personal experience, suggestions, negative aspects of the current situation and differences in training of possible situations with reality at the site of the accident.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Čtvrtečka, Lukáš. "Podnikatelský plán." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72730.

Повний текст джерела
Анотація:
The Master's Thesis is divided into two parts. The first part is represented by theoretical part. Theoretical part is focused on business plan, automotive industry and legal forms of business in the Czech Republic. There are described requirements for the structure of a business plan and also recommendation on the writing a business plan. Practical part is based on the theoretical part and is represented by the business plan of a car repair service specializing in electronics and car security. We can also find competitor analysis, environmental analysis and prediction of output. The SWOT analysis is contained here as well.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Goikoetxea, Yanci Asier. "Smart card security." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3091/.

Повний текст джерела
Анотація:
Smart Card devices are commonly used on many secure applications where there is a need to identify the card holder in order to provide a personalised service. The value of access to locked data and services makes Smart Cards a desirable attack target for hackers of all sorts. The range of attacks a Smart Card and its environment can be subjected to ranges from social engineering to exploiting hardware and software bugs and features. This research has focused on several hardware related attacks and potential threats. Namely, power glitch attack, power analysis, laser attack, the potential effect on security of memory power consumption reduction techniques and using a re-configurable instruction set as method to harden opcode interpretation. A semi-automated simulation environment to test designs against glitch attacks and power analysis has been developed. This simulation environment can be easily integrated within Atmel’s design flow to bring assurance of their designs’ behaviour and permeability to such attacks at an early development stage. Previous power analysis simulation work focused on testing the implementation of part of the cryptographic algorithm. This work focuses on targeting the whole algorithm, allowing the test of a wider range of countermeasures. A common glitch detection approach is monitoring the power supply for abnormal voltage values and fluctuations. This approach can fail to detect some fast glitches. The alternative approach used in this research monitors the effects of a glitch on a mono-stable circuit sensitive to fault injection by glitch attacks. This work has resulted in a patented glitch detector that improves the overall glitch detection range. The use of radiation countermeasures as laser countermeasures and potential sensors has been investigated too. Radiation and laser attacks have similar effects on silicon devices. Whilst several countermeasures against radiation have been developed over the years, almost no explicit mention of laser countermeasures was found. This research has demonstrated the suitability of using some radiation countermeasures as laser countermeasures. Memory partitioning is a static and dynamic power consumption reduction technique successfully used in various devices. The nature of Smart Card devices restricts the applicability of some aspects of this power reduction technique. This research line has resulted in the proposal of a memory partitioning approach suitable to Smart Cards.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bengtsson, Robin. "Security creating technology for elderly care." Thesis, Tekniska Högskolan, Jönköping University, JTH, Industridesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50760.

Повний текст джерела
Анотація:
The aging population is growing and as more elderly need nursing the demand on elderly care is increasing. There is a risk of not having enough staff in an industry that already lacks educated staff. Many of the employees also complain that they are stressed out. This has led to an increasing number of gadgets and tools used within elderly care but not without problems. The technologies have been criticized for being designed to fit the need of the people in control rather than the elderly and the caregivers. This thesis has mapped the situation within todays elderly care and provided a solution to those needs and problems found. The focus has been to make a design that is fit for the elderly and the caregivers. The project has been made with a human centered design approach by letting elderly and caregivers participate in the process. A keystone has been to make the solution emit a sense of coherence for the elderly. The result is a radar unit which scans for blood pressure, respiration, pulse, and falls. The radar can be complimented with a camera to provide even more security. The achieved result can bring a sense of coherence for the elderly but needs to be further tested in order to prove it. This work can be used for future studies.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Car security"

1

Webb, Barry. Preventing car crime in car parks. London: Home Office, Crime Prevention Unit, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Standing Conference on Crime Prevention. Working Group on Car Security. Report of the Working Group on Car Security. [London]: Home Office, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Border-Lands USA: [or, how to protect the country by car]. Miami Beach, FL: Earthdog Press, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Southall, Dean. Designing for vehicle security: Towards a crime free car. London: Home Office, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Stübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Phillips, Bill. Home mechanix guide to security: Protecting your home, car & family. New York: Wiley, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Home security: How to select reliable locks and alarms for your home, office, or car. Boulder, Colo: Paladin Press, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Security systems simplified: Protecting your home, business, and car with state-of-the-art burglar alarms. Boulder, Colo: Paladin Press, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Understanding car parks, crime, and CCTV: Evaluation lessons from safer cities. London: Home Office Police Dept., 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Stübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer. Wiesbaden: Springer Fachmedien Wiesbaden, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Car security"

1

Mansor, Hafizah, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian. "Log Your Car: Reliable Maintenance Services Record." In Information Security and Cryptology, 484–504. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kurunathan, Harrison, Ricardo Severino, Ênio Filho, and Eduardo Tovar. "WiCAR - Simulating Towards the Wireless Car." In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 136–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55583-2_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bella, Giampaolo, Pietro Biondi, and Giuseppe Tudisco. "Car Drivers’ Privacy Concerns and Trust Perceptions." In Trust, Privacy and Security in Digital Business, 143–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86586-3_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Stübing, Hagen. "Physical Layer Security: Secure Car-to-X Beamforming." In Multilayered Security and Privacy Protection in Car-to-X Networks, 131–68. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02531-1_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Xing, and Liang Zhou. "Classification of Car Scratch Types Based on Optimized BP Neural Network." In Cloud Computing and Security, 148–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Symeonidis, Iraklis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart Mennink, Siemen Dhooghe, and Bart Preneel. "SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision." In Computer Security – ESORICS 2017, 475–93. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66399-9_26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Palma, Lucas M., Fernanda O. Gomes, Martín Vigil, and Jean E. Martina. "A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs." In Information Systems Security, 3–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Li, Duohui, Sisi Tan, Jianzhi Zhang, and Wangdong Jiang. "Hungarian Method in a Car-Sharing System Application Research." In Advances in Artificial Intelligence and Security, 265–75. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Franeková, Mária, and Peter Lüley. "Security of Digital Signature Schemes for Car-to-Car Communications within Intelligent Transportation Systems." In Communications in Computer and Information Science, 258–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41647-7_32.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shin, Yong-Yoon, and Byung-Yun Lee. "A Study for Car Insurance Service Using Vehicle Real Time Information." In IT Convergence and Security 2012, 241–46. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Car security"

1

Park, Jaehyun, Hongjin Kim, Junbo Shim, Junseok Kim, Hojin Lee, Jaeyoon Kim, Hongkyo Kim, Hayeon Ra, and Sungjin Hong. "Study of Car Dash Cam Security Vulnerabilities." In the 4th International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/3026724.3026732.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jacob, Aleesha Susan, Vandita Chaurasiya, Vagmayee Sharda, and Shubhra Dixit. "Car surveillance security system." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203640.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Glas, Benjamin, Oliver Sander, Vitali Stuckert, Klaus D. Muller-Glaser, and Jurgen Becker. "Car-to-Car Communication Security on Reconfigurable Hardware." In 2009 IEEE 69th Vehicular Technology Conference Spring. IEEE, 2009. http://dx.doi.org/10.1109/vetecs.2009.5073433.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mahesh, E. Kiran, Piyush C. Jagadale, and B. Karthikeyan. "Advanced Security System for Car." In 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sehgal, Vivek Kumar, Soumitra Mehrotra, and Harshit Marwah. "Car security using Internet of Things." In 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES). IEEE, 2016. http://dx.doi.org/10.1109/icpeices.2016.7853207.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rashidi, F. R. M., M. H. Ariff, and M. Z. Ibrahim. "Car monitoring using Bluetooth security system." In 2011 International Conference on Electrical, Control and Computer Engineering (INECCE). IEEE, 2011. http://dx.doi.org/10.1109/inecce.2011.5953919.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Khurram, Muzaffar, Hemanth Kumar, Adi Chandak, Varun Sarwade, Nitu Arora, and Tony Quach. "Enhancing connected car adoption: Security framework." In 2016 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2016. http://dx.doi.org/10.1109/iccve.2016.5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Singandhupe, Ashutosh, and Hung Manh La. "MCC-EKF for Autonomous Car Security." In 2020 Fourth IEEE International Conference on Robotic Computing (IRC). IEEE, 2020. http://dx.doi.org/10.1109/irc.2020.00056.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Luo, Feng, Zhaojing Zhang, Yifei Ma, and Qiujian Li. "Security Mechanism for Digital Car Key." In 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2021. http://dx.doi.org/10.1109/ccet52649.2021.9544216.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Steinvall, Ove, Stig Sandberg, Ulf Hörberg, Rolf Persson, Folke Berglund, Kjell Karslsson, Johan Öhgren, Zhaohua Yu, and Per Söderberg. "Laser dazzling impacts on car driver performance." In SPIE Security + Defence, edited by David H. Titterton, Mark A. Richardson, Robert J. Grasso, Harro Ackermann, and Willy L. Bohn. SPIE, 2013. http://dx.doi.org/10.1117/12.2028505.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Car security"

1

Baudais, Virginie, Annelies Hickendorff, Jaïr van der Lijn, Igor Acko, Souleymane Maiga, and Hussein Yusuf Ali. EU Military Training Missions: A Synthesis Report. Stockholm International Peace Research Institute, May 2022. http://dx.doi.org/10.55163/lfle9658.

Повний текст джерела
Анотація:
This paper draws overarching conclusions based on a synthesis of previously published case studies that examined the impact of EU military training missions (EUTMs) in Somalia (EUTM Somalia, 2010–), Mali (EUTM Mali, 2013–), the Central African Republic (CAR) (EUTM RCA, 2016–). It concludes that EUTMs are relevant niche operations. Despite difficult circumstances beyond the control of the missions, EUTM training and advisory efforts have increased the effectiveness of partner armed forces. While these gains have been marginal in CAR and Somalia, they have been a bit more pronounced in Mali. Yet, broader security sector reform and defence sector reform efforts to improve the accountability and governance of defence and security sectors have become bogged down. The main challenge is that EUTMs are generally mandated to implement largely technical and tactical agendas in contexts where the ongoing armed conflict and the politics of the security sector are not conducive to building professional national security forces. As a consequence EUTMs find themselves caught up in interlinked and partially overlapping dilemmas. This study concludes with seven partly overlapping recommendations to EU member states and to EUTMs to address the main limitations that are restricting the impact of the missions.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.

Повний текст джерела
Анотація:
As automobiles morph from stand-alone mechanical objects to highly connected, autonomous systems with increasing amounts of electronic components. To manage these complex systems, some semblance of in-car decision-making is also being built and networked to a cloud architecture. This cloud can also enable even deeper capabilities within the broader automotive ecosystem. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wilson, Elizabeth F. Homeland Security - Can It be Done? Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415743.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gay, John E. Green Peace: Can Biofuels Accelerate Energy Security. Fort Belvoir, VA: Defense Technical Information Center, February 2013. http://dx.doi.org/10.21236/ad1018855.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cutrera, Fillipo. Do the BRICS care about International Security? E-papers Servicos Editoriais Ltda, January 2019. http://dx.doi.org/10.48207/23181818/pb0902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Thomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.

Повний текст джерела
Анотація:
West African women are frequently absent from discussions of community security, despite their substantial contributions to local defense. Women are often viewed primarily as beneficiaries of attempts to reduce local violence, such that their roles in community-based security are typically overlooked. Yet women’s participation in CBAGs holds important implications for the national security of conflict-affected states. Understanding women’s participation in community-based armed groups matters for successful demobilization, disarmament, and reintegration programs and for states’ implementation of the global Women, Peace, and Security agenda, particularly gendered security sector reform. That women have been active—and in some cases instrumental— in establishing and maintaining local security can serve as a point of reference for states seeking to integrate more women into security institutions. Moreover, since CBAG politics are often governed by local norms and practices, understanding how women have become integrated into these local security structures can suggest means of achieving gendered security sector reform that are consistent with and respectful of local customs. This policy note briefly outlines and expounds upon some of the main insights of the author’s recent study on women’s participation in West African CBAGs. It proposes a set of considerations for states and stakeholders to structure efforts around gendered security sector reform.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, February 2020. http://dx.doi.org/10.32468/be.1103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.

Повний текст джерела
Анотація:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, December 2021. http://dx.doi.org/10.51593/2021ca007.

Повний текст джерела
Анотація:
Artificial intelligence will play an increasingly important role in cyber defense, but vulnerabilities in AI systems call into question their reliability in the face of evolving offensive campaigns. Because securing AI systems can require trade-offs based on the types of threats, defenders are often caught in a constant balancing act. This report explores the challenges in AI security and their implications for deploying AI-enabled cyber defenses at scale.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Albers, Paul J. Can Peacekeeping and Security Assistance Co-Exist? A Bosnia Case Study. Fort Belvoir, VA: Defense Technical Information Center, May 1997. http://dx.doi.org/10.21236/ada328188.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії