語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Automotive Cyber Security = Introduc...
~
SpringerLink (Online service)
Automotive Cyber Security = Introduction, Challenges, and Standardization /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Automotive Cyber Security/ by Shiho Kim, Rakesh Shrestha.
其他題名:
Introduction, Challenges, and Standardization /
作者:
Kim, Shiho.
其他作者:
Shrestha, Rakesh.
面頁冊數:
XVII, 216 p. 78 illus., 76 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-981-15-8053-6
ISBN:
9789811580536
Automotive Cyber Security = Introduction, Challenges, and Standardization /
Kim, Shiho.
Automotive Cyber Security
Introduction, Challenges, and Standardization /[electronic resource] :by Shiho Kim, Rakesh Shrestha. - 1st ed. 2020. - XVII, 216 p. 78 illus., 76 illus. in color.online resource.
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles’ intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
ISBN: 9789811580536
Standard No.: 10.1007/978-981-15-8053-6doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: TL1-483
Dewey Class. No.: 629.2
Automotive Cyber Security = Introduction, Challenges, and Standardization /
LDR
:03800nam a22003975i 4500
001
1029660
003
DE-He213
005
20200924170013.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811580536
$9
978-981-15-8053-6
024
7
$a
10.1007/978-981-15-8053-6
$2
doi
035
$a
978-981-15-8053-6
050
4
$a
TL1-483
072
7
$a
TRC
$2
bicssc
072
7
$a
TEC009090
$2
bisacsh
072
7
$a
TRC
$2
thema
072
7
$a
TRCS
$2
thema
082
0 4
$a
629.2
$2
23
100
1
$a
Kim, Shiho.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1321368
245
1 0
$a
Automotive Cyber Security
$h
[electronic resource] :
$b
Introduction, Challenges, and Standardization /
$c
by Shiho Kim, Rakesh Shrestha.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XVII, 216 p. 78 illus., 76 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
520
$a
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles’ intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Security Science and Technology.
$3
783419
650
1 4
$a
Automotive Engineering.
$3
683772
650
0
$a
Computer security.
$3
557122
650
0
$a
System safety.
$3
639363
650
0
$a
Automotive engineering.
$3
1104081
700
1
$a
Shrestha, Rakesh.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1326447
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811580529
776
0 8
$i
Printed edition:
$z
9789811580543
776
0 8
$i
Printed edition:
$z
9789811580550
856
4 0
$u
https://doi.org/10.1007/978-981-15-8053-6
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入