Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
1 SI
Page No.
2447 - 2451
References
Daniel, B., 2014. Identifying telematics threats. IQT. Quartery Summer, 6: 17-21.
Direct Link | Duri, S., M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.M. Tang, 2002. Framework for security and privacy in automotive telematics. Proceedings of the 2nd International Workshop on Mobile Commerce, September 28, 2002, Atlanta, GA, USA, pp: 25-32.
Eichler, S., J. Billion, R. Maier, H.J. Vogel and R. Kroh
et al., 2005. On providing security for an open telematics platform. Proceedings of the 5th International Conference on ITS Telecommunications, June 27-29, 2005, Technical University of Munich, Munich, Germany, pp: 1-4.
Foster, I.D., A. Prudhomme, K. Koscher and S. Savage, 2015. Fast and vulnerable: A story of telematic failures. Proceedings of the 9th USENIX Workshop on Offensive Technologies, August 20, 2015, Woot Carrollton, Texas, USA., pp: 1-9.
Francois, T., I. Toshiya and P. Christopher, 2009. Automotive Telematics: Driving Toward the Wireless World. Booz Allen Hamilton, McLean, Virginia, USA.,.
Kaminski, T., M. Kruszewski, M. Niezgoda and J. Gacparska-Stolek, 2011. Telematic security system for cash transport vehicle. J. KONES., 18: 149-154.
Direct Link | Koscher, K., A. Czeskis, F. Roesner, S. Patel and T. Kohno
et al., 2010. Experimental security analysis of a modern automobile. Proceedings of the 2010 IEEE International Symposium on Security and Privacy (SP), May 16-19, 2010, IEEE, Berkeley, California, USA., ISBN:978-1-4244-6895-9, pp: 447-462.
Nobuhiro, K. and M. Manabu, 2014. Telematics-compatible information security technology. Tech. Rep., 145: 16-18.
Prabu, A.V., B. Kodavati, T.A. Rao, E. Rambabu and S.S. Tripathy, 2011. Telematics based security system. Intl. J. Wireless Mobile Networks, 3: 138-147.
Direct Link |