[1. Amar, N., (2006) LIDAR technology overview. ETI–US Geological Survey, Retrieved August 17.]Search in Google Scholar
[2. Broggi, A. et al. (2013) Extensive Tests of Autonomous Driving Technologies. IEEE Transactions on Intelligent Transportation Systems, 14.3. 1403–1415.10.1109/TITS.2013.2262331]Search in Google Scholar
[3. Chirchi, V.R.E et al. (2011) Iris Biometric Recognition for Person Identification in Security Systems, International Journal of Computer Application, 24, 9. 0975-8887.]Search in Google Scholar
[4. Jawhar, I, Mohamed, N. and Usmani, H. (2013) An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware. Journal of Networks, 8, 12. 2749–2761.10.4304/jnw.8.12.2749-2761]Search in Google Scholar
[5. Kade Mahesh, K. Kishore, P.V.V. and Karande Kailash, J. (2017) Survey on Iris Image Analysis, Indian Journal of Science and Technology, 10(19),1-15.10.17485/ijst/2017/v10i19/97455]Search in Google Scholar
[6. Kastner, R. and Michalke, T. (2010) Attention-based traffic sign recognition with an array of weak classifiers. (IV), 2010 IEEE (June 2010). 333–339.10.1109/IVS.2010.5548143]Search in Google Scholar
[7. Kerns, A.J., Wesson, K.D. and Humphreys T.E. (2014) A blueprint for civil GPS navigation message authentication. Position, Location and Navigation Symposium - PLANS 2014 (May 2014), 262–269.10.1109/PLANS.2014.6851385]Search in Google Scholar
[8. Knoll, A. (2014) Environmental Sensing and Data Processing.]Search in Google Scholar
[9. Parwin, R. and Verma, S. (2016) Iris Recognition Using Dual tree complex transform, International Journal of Engineering Development and Research, 4, 4. 2321-9939.]Search in Google Scholar
[10. Petit, J., Feiri, M. and Kargl, (2014) Revisiting attacker model for smart vehicles. Wireless Vehicular Communications (WiVeC), IEEE 6th International Symposium. pp. 1–5.10.1109/WIVEC.2014.6953258]Search in Google Scholar
[11. Raiyn, J, (2013a) Detection of Objects in Motion - A Survey of Video Surveillance, Advances in Internet of Things, 3: 73-78.10.4236/ait.2013.34010]Search in Google Scholar
[12. Raiyn, J. (2013b) Handoff self-management based on SNR in mobile communication networks, Int. J. Wireless and Mobile Computing, 2013; 6(1): 39-48.10.1504/IJWMC.2013.053032]Search in Google Scholar
[13. Raiyn, J. (2016) Speed Adaptation in Urban Road Network Management, Transport and Telecommunication, 17, 2. 11-121]Search in Google Scholar
[14. Raiyn, J. (2017a) Road traffic congestion management based on search allocation approach, Transport and Telecommunication. 18. (1).25-33.10.1515/ttj-2017-0003]Search in Google Scholar
[15. Raiyn, J. (2017b) Developing Vehicle Locations Strategy on Urban Road, Transport and Telecommunication, 18. (4). 253–262.10.1515/ttj-2017-0022]Search in Google Scholar
[16. Schmittner, C. et al. (2014) Security Application of Failure Mode and Effect Analysis. Computer Safety, Reliability and Security. pp. 310–325.10.1007/978-3-319-10506-2_21]Search in Google Scholar
[17. Toledo-Moreo, R. (2010) Lane-level integrity provision for navigation and map matching with GNSS, dead reckoning and enhanced maps. IEEE Transactions on Intelligent Transportation Systems, 11, 1. 100–112.10.1109/TITS.2009.2031625]Search in Google Scholar
[18. Uma, M. and Padmavathi, G. (2013) A Survey on Various Cyber Attacks and their Classification, International Journal of Network Security, 15, 6. 391-397.]Search in Google Scholar
[19. Velaga, N.R., Quddus, M.A. and Bristow A.L. (2010) Detecting and Correcting Map Matching Error in Location-Based Intelligent Transport Systems, 12th WCTR, 2010 July, Lisbon, Portugal.]Search in Google Scholar
[20. Zandbergen, A.P. (2009) Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning, Transactions in GIS, 13(1). 5-16.]Search in Google Scholar