Open Access

Data and Cyber Security in Autonomous Vehicle Networks

   | Nov 30, 2018

Cite

1. Amar, N., (2006) LIDAR technology overview. ETI–US Geological Survey, Retrieved August 17.Search in Google Scholar

2. Broggi, A. et al. (2013) Extensive Tests of Autonomous Driving Technologies. IEEE Transactions on Intelligent Transportation Systems, 14.3. 1403–1415.10.1109/TITS.2013.2262331Search in Google Scholar

3. Chirchi, V.R.E et al. (2011) Iris Biometric Recognition for Person Identification in Security Systems, International Journal of Computer Application, 24, 9. 0975-8887.Search in Google Scholar

4. Jawhar, I, Mohamed, N. and Usmani, H. (2013) An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware. Journal of Networks, 8, 12. 2749–2761.10.4304/jnw.8.12.2749-2761Search in Google Scholar

5. Kade Mahesh, K. Kishore, P.V.V. and Karande Kailash, J. (2017) Survey on Iris Image Analysis, Indian Journal of Science and Technology, 10(19),1-15.10.17485/ijst/2017/v10i19/97455Search in Google Scholar

6. Kastner, R. and Michalke, T. (2010) Attention-based traffic sign recognition with an array of weak classifiers. (IV), 2010 IEEE (June 2010). 333–339.10.1109/IVS.2010.5548143Search in Google Scholar

7. Kerns, A.J., Wesson, K.D. and Humphreys T.E. (2014) A blueprint for civil GPS navigation message authentication. Position, Location and Navigation Symposium - PLANS 2014 (May 2014), 262–269.10.1109/PLANS.2014.6851385Search in Google Scholar

8. Knoll, A. (2014) Environmental Sensing and Data Processing.Search in Google Scholar

9. Parwin, R. and Verma, S. (2016) Iris Recognition Using Dual tree complex transform, International Journal of Engineering Development and Research, 4, 4. 2321-9939.Search in Google Scholar

10. Petit, J., Feiri, M. and Kargl, (2014) Revisiting attacker model for smart vehicles. Wireless Vehicular Communications (WiVeC), IEEE 6th International Symposium. pp. 1–5.10.1109/WIVEC.2014.6953258Search in Google Scholar

11. Raiyn, J, (2013a) Detection of Objects in Motion - A Survey of Video Surveillance, Advances in Internet of Things, 3: 73-78.10.4236/ait.2013.34010Search in Google Scholar

12. Raiyn, J. (2013b) Handoff self-management based on SNR in mobile communication networks, Int. J. Wireless and Mobile Computing, 2013; 6(1): 39-48.10.1504/IJWMC.2013.053032Search in Google Scholar

13. Raiyn, J. (2016) Speed Adaptation in Urban Road Network Management, Transport and Telecommunication, 17, 2. 11-121Search in Google Scholar

14. Raiyn, J. (2017a) Road traffic congestion management based on search allocation approach, Transport and Telecommunication. 18. (1).25-33.10.1515/ttj-2017-0003Search in Google Scholar

15. Raiyn, J. (2017b) Developing Vehicle Locations Strategy on Urban Road, Transport and Telecommunication, 18. (4). 253–262.10.1515/ttj-2017-0022Search in Google Scholar

16. Schmittner, C. et al. (2014) Security Application of Failure Mode and Effect Analysis. Computer Safety, Reliability and Security. pp. 310–325.10.1007/978-3-319-10506-2_21Search in Google Scholar

17. Toledo-Moreo, R. (2010) Lane-level integrity provision for navigation and map matching with GNSS, dead reckoning and enhanced maps. IEEE Transactions on Intelligent Transportation Systems, 11, 1. 100–112.10.1109/TITS.2009.2031625Search in Google Scholar

18. Uma, M. and Padmavathi, G. (2013) A Survey on Various Cyber Attacks and their Classification, International Journal of Network Security, 15, 6. 391-397.Search in Google Scholar

19. Velaga, N.R., Quddus, M.A. and Bristow A.L. (2010) Detecting and Correcting Map Matching Error in Location-Based Intelligent Transport Systems, 12th WCTR, 2010 July, Lisbon, Portugal.Search in Google Scholar

20. Zandbergen, A.P. (2009) Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning, Transactions in GIS, 13(1). 5-16.Search in Google Scholar

eISSN:
1407-6179
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other