Shaaban et al., 2020 - Google Patents
An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain.Shaaban et al., 2020
View PDF- Document ID
- 2170317411046184581
- Author
- Shaaban A
- Schmittner C
- Gruber T
- Mohamed A
- Quirchmayr G
- Schikuta E
- et al.
- Publication year
- Publication venue
- J. Data Intell.
External Links
Snippet
Many electronic and electrical systems are now incorporated with modern vehicles to control functional safety. Lack of security protection mechanisms in vehicular design may lead to different ways of executing malicious attacks against the vehicular network. These attacks …
- 238000000034 method 0 description 31
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schmittner et al. | A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems | |
Shaaban et al. | Ontology-based model for automotive security verification and validation | |
Xu et al. | Remote attestation with domain-based integrity model and policy analysis | |
kamal Kaur et al. | Dependability analysis of safety critical systems: Issues and challenges | |
Glas et al. | Automotive safety and security integration challenges | |
De Souza et al. | Extending STPA with STRIDE to identify cybersecurity loss scenarios | |
Schmidt et al. | Adapted development process for security in networked automotive systems | |
Lara et al. | Adaptive security based on mape-k: A survey | |
Fleming et al. | Cyberphysical security through resiliency: A systems-centric approach | |
Hamad et al. | Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System. | |
Hansch et al. | Deriving impact-driven security requirements and monitoring measures for industrial IoT | |
Oates et al. | Security-aware, model-based systems engineering with SysML | |
Chechulin et al. | An approach for network information flow analysis for systems of embedded components | |
Al-Ghuraybi et al. | Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems | |
Li | Safe and secure model-driven design for embedded systems | |
Shaaban et al. | An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain. | |
Wei et al. | A system theoretic approach to cybersecurity risk analysis and mitigation for autonomous passenger vehicles | |
Jayaram et al. | Software engineering for secure software-state of the art: A survey | |
Chen et al. | A Knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems | |
Span et al. | A systems security approach for requirements analysis of complex cyber-physical systems | |
Püllen et al. | ISO/SAE 21434-based risk assessment of security incidents in automated road vehicles | |
Jakobs et al. | Following the white rabbit: Integrity verification based on risk analysis results | |
Nazarov | Estimation of the information safety level of modern infocommunication networks on the basis of the logic-probability approach | |
Beling et al. | The “Mission Aware” Concept for Design of Cyber‐Resilience | |
Iyieke et al. | An Adaptable Security by Design Approach for Ensuring a Secured Remote Monitoring Teleoperation (RMTO) of an Autonomous Vehicle |