소장자료
LDR | 03548cam a2200000 a | ||
001 | 0100516742▲ | ||
003 | OCoLC▲ | ||
005 | 20210615135642▲ | ||
007 | ta ▲ | ||
008 | 200731s2020 si a b 000 0 eng c▲ | ||
020 | ▼a9811580529 (hbk.)▲ | ||
020 | ▼a9789811580529 (hbk.)▲ | ||
035 | ▼a(OCoLC)1178905407▲ | ||
040 | ▼aYDX▼beng▼cYDX▼dBDX▼dLQU▼dYDXIT▼dOCLCQ▼d221016▲ | ||
082 | 0 | 4 | ▼a629.22028▼223▲ |
090 | ▼a629.22028▼bK49a▲ | ||
100 | 1 | ▼aKim, Shiho.▲ | |
245 | 1 | 0 | ▼aAutomotive cyber security :▼bintroduction, challenges, and standardization /▼cShiho Kim, Rakesh Shrestha.▲ |
260 | ▼aSingapore :▼bSpringer,▼c[2020].▲ | ||
300 | ▼axvii, 216 p. :▼bill. (some color) ;▼c25 cm.▲ | ||
504 | ▼aIncludes bibliographical references.▲ | ||
520 | ▼aThis book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.▲ | ||
650 | 0 | ▼aAutomated vehicles▼xComputer networks▼xSecurity measures.▲ | |
700 | 1 | ▼aShrestha, Rakesh.▲ |

Automotive cyber security :introduction, challenges, and standardization
자료유형
국외단행본
서명/책임사항
Automotive cyber security : introduction, challenges, and standardization / Shiho Kim, Rakesh Shrestha.
발행사항
Singapore : Springer , [2020].
형태사항
xvii, 216 p. : ill. (some color) ; 25 cm.
서지주기
Includes bibliographical references.
요약주기
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
ISBN
9811580529 (hbk.) 9789811580529 (hbk.)
청구기호
629.22028 K49a
소장정보
예도서예약
서서가에없는책 신고
보보존서고신청
캠캠퍼스대출
우우선정리신청
배자료배달신청
문문자발송
출청구기호출력
학소장학술지 원문서비스
등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 서비스 |
---|
북토크
자유롭게 책을 읽고
느낀점을 적어주세요
글쓰기
느낀점을 적어주세요
청구기호 브라우징
관련 인기대출 도서