GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Periodica Polytechnica Budapest University of Technology and Economics  (2)
Material
Publisher
  • Periodica Polytechnica Budapest University of Technology and Economics  (2)
Language
Years
  • 1
    Online Resource
    Online Resource
    Periodica Polytechnica Budapest University of Technology and Economics ; 2019
    In:  Periodica Polytechnica Transportation Engineering Vol. 48, No. 3 ( 2019-09-11), p. 253-259
    In: Periodica Polytechnica Transportation Engineering, Periodica Polytechnica Budapest University of Technology and Economics, Vol. 48, No. 3 ( 2019-09-11), p. 253-259
    Abstract: Cybersecurity is becoming more and more relevant. Autonomous vehicles handle large amounts of data and can connect to more and more existing devices, smartphones, tablets, or even other cars and systems. This poses the risk of unauthorized access to data. Theoretically cars have separate computer units, operate in isolation, and are not connected, so there is less possibility to be attacked. However if the vehicles are interconnected, hackers can have easier access to personal data. They can get information about the location of the car owner, their typical trips, and, for example, allow an intruder to know when the tracked person is not at home. Furthermore it can also be happened that the vehicle operation is maliciously disturbed, which can result in a security risk for the passengers. In extreme cases, computer terrorist attacks can also be prepared - large-scale interventions on roads can lead to chaos across a region or country. In accordance with the introduced threats, it is a crucial objective of this research to indicate specific methods, which can help the industry to evaluate and prepare for these kinds of attacks in a proper way.
    Type of Medium: Online Resource
    ISSN: 1587-3811 , 0303-7800
    Language: Unknown
    Publisher: Periodica Polytechnica Budapest University of Technology and Economics
    Publication Date: 2019
    detail.hit.zdb_id: 2074944-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Periodica Polytechnica Budapest University of Technology and Economics ; 2019
    In:  Periodica Polytechnica Transportation Engineering Vol. 49, No. 1 ( 2019-10-24), p. 80-88
    In: Periodica Polytechnica Transportation Engineering, Periodica Polytechnica Budapest University of Technology and Economics, Vol. 49, No. 1 ( 2019-10-24), p. 80-88
    Abstract: The assurance of process safety plays an important role in the field of information technology. Securing the information has become one of the biggest challenges in the present day. Whenever we think about the protected systems the first thing that comes to our mind can be malicious interventions which are increasing immensely day by day. Nowadays we live the world of huge automotive developments with the appearance of the demand for autonomous vehicles. On the other hand, technological developments also provide a lot of advantages for the society. The benefits of autonomous cars include reduced mobility costs, increased safety, increased mobility, significant reduction of traffic collisions. However, it cannot be forgotten that the extension of cyberspace affects the transportation increasingly. Accordingly, cars are produced with high level of connectivity and automation. Therefore, the risks arriving from the cyberspace can now endanger the safe and secured transportation. These tendencies shall motivate manufacturers and developers to permanently improve the ability of vehicles to protect themselves and their passengers.
    Type of Medium: Online Resource
    ISSN: 1587-3811 , 0303-7800
    Language: Unknown
    Publisher: Periodica Polytechnica Budapest University of Technology and Economics
    Publication Date: 2019
    detail.hit.zdb_id: 2074944-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...