A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment
Abstract
References
Index Terms
- A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment
Recommendations
Autonomous vehicular overtaking maneuver: A survey and taxonomy
AbstractAutonomous vehicles (AVs) are the next-generation driver-less vehicular entities with advanced technologies. Overtaking is an important and challenging maneuver that needs to be frequently performed in diverse environments during the ...
PIER: cyber-resilient risk assessment model for connected and autonomous vehicles
AbstractAs more vehicles are being connected to the Internet and equipped with autonomous driving features, more robust safety and security measures are required for connected and autonomous vehicles (CAVs). Therefore, threat analysis and risk assessment ...
Motion planning of autonomous vehicles in a non-autonomous vehicle environment without speed lanes
Planning is one of the key problems for autonomous vehicles operating in road scenarios. Present planning algorithms operate with the assumption that traffic is organised in predefined speed lanes, which makes it impossible to allow autonomous vehicles ...
Comments
Information & Contributors
Information
Published In
- Editors:
- Vaneet Aggarwal,
- Satish V. Ukkusuri,
- Guest Editorss:
- Mizanur Rahman,
- Mhafuzul Islam,
- Lipika Deka,
- Mashrur Chowdhury
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Natural Sciences & Engineering Research Council of Canada
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 333Total Downloads
- Downloads (Last 12 months)333
- Downloads (Last 6 weeks)14
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in