Difference between revisions of "Munir2013cycar"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 5: | Line 5: | ||
|abstract=<p>The next generation of automobiles (also known as CyberVehicles) will increasingly incorporate electronic control units in novel automotive control applications. Recent work has demonstrated vulnerability of modern automotive control systems to security attacks that directly impact CyberVehicles\’ physical safety and dependability. The First International Academic Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR\’13) focuses on security and privacy topics in CyberVehicles that are within the scope of ACM Conference on Computer and Communications Security (CCS). Specifically, the workshop targets issues related to security and privacy issues in computerized, complex, and connected modern vehicles as well as their complex supply chains. This workshop offers an opportunity to trigger the transfer of the accumulated knowledge by the ACM CCS community to the car industry while taking into account typical automotive constraints such as interoperability, reliability, dependability, quality, resource constraints and/or complex supply chain.</p> | |abstract=<p>The next generation of automobiles (also known as CyberVehicles) will increasingly incorporate electronic control units in novel automotive control applications. Recent work has demonstrated vulnerability of modern automotive control systems to security attacks that directly impact CyberVehicles\’ physical safety and dependability. The First International Academic Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR\’13) focuses on security and privacy topics in CyberVehicles that are within the scope of ACM Conference on Computer and Communications Security (CCS). Specifically, the workshop targets issues related to security and privacy issues in computerized, complex, and connected modern vehicles as well as their complex supply chains. This workshop offers an opportunity to trigger the transfer of the accumulated knowledge by the ACM CCS community to the car industry while taking into account typical automotive constraints such as interoperability, reliability, dependability, quality, resource constraints and/or complex supply chain.</p> | ||
|pages=1481 - 1482 | |pages=1481 - 1482 | ||
|month=11 | |||
|year=2013 | |||
|booktitle=Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security - CCS {\textquoteright}13 | |booktitle=Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security - CCS {\textquoteright}13 | ||
|title=CyCAR{\textquoteright}2013: First international academic workshop on security, privacy and dependability for cybervehicles | |title=CyCAR{\textquoteright}2013: First international academic workshop on security, privacy and dependability for cybervehicles | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:41, 4 September 2021
Munir2013cycar | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Arslan Munir and Farinaz Koushanfar and Seudi{\'e}, Herv{\'e} and Ahmad-Reza Sadeghi |
booktitle | Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security - CCS {\textquoteright}13 |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 11 |
note | |
number | |
organization | |
pages | 1481 - 1482 |
publisher | |
school | |
series | |
title | CyCAR{\textquoteright}2013: First international academic workshop on security, privacy and dependability for cybervehicles |
type | |
volume | |
year | 2013 |
doi | 10.1145/2508859.2509030 |
issn | |
isbn | |
url | http://dl.acm.org/citation.cfm?doid=2508859.2509030 |