Academic literature on the topic 'Automobile security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Automobile security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Automobile security"
Okegbile, Samuel Dayo, Segun Aina, Sanmi Akinmodun, Adeniran Ishola Oluwaranti, and Aderonke Rasheedat Lawal. "A Multimodal Approach to Enhancing Automobile Security." International Journal of Computer Vision and Image Processing 9, no. 2 (April 2019): 32–47. http://dx.doi.org/10.4018/ijcvip.2019040103.
Full textBrooks, R. R., S. Sander, Juan Deng, and Joachim Taiber. "Automobile security concerns." IEEE Vehicular Technology Magazine 4, no. 2 (June 2009): 52–64. http://dx.doi.org/10.1109/mvt.2009.932539.
Full textAdhikari, Deependra, Kabita Nepal, Deepak Rasaily, and Aarfin Ashraf. "Advanced Security System for Automobile." International Journal of Engineering Trends and Technology 33, no. 7 (March 25, 2016): 365–68. http://dx.doi.org/10.14445/22315381/ijett-v33p270.
Full textBabu, Prathibha S., K. L. Sree Harsha, A. Santosh, M. Naga Kaushik, and K. Anil Kumar. "Arduino Based Automobile Security System." Indian Journal of Science and Technology 11, no. 23 (June 1, 2018): 1–8. http://dx.doi.org/10.17485/ijst/2018/v11i23/125627.
Full textLei, Qiong Hong. "The Study of Holonic Control Strategy in Modern Automobile." Advanced Materials Research 308-310 (August 2011): 2258–61. http://dx.doi.org/10.4028/www.scientific.net/amr.308-310.2258.
Full textZhang, Xiao Yan, Pei Xin Qu, and Xiao Jing Li. "Braking Performance Study for Automobile with Numerical Simulation." Applied Mechanics and Materials 155-156 (February 2012): 1159–63. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.1159.
Full textB, Jignesh. "Innovative Automobile Security System Using Various Security Modules." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 583–86. http://dx.doi.org/10.17762/ijritcc2321-8169.150233.
Full textWang, Xiu Feng, and Gang Cui. "Multifunction GPS/GPRS Automobile Security System." Advanced Materials Research 433-440 (January 2012): 629–34. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.629.
Full text., N. Chandra Kumar. "SMART AUTOMOBILE SECURITY SYSTEM USING LABVIEW." International Journal of Research in Engineering and Technology 03, no. 14 (March 25, 2014): 35–38. http://dx.doi.org/10.15623/ijret.2014.0314007.
Full textPervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.
Full textDissertations / Theses on the topic "Automobile security"
Kalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Full textChawan, Akshay. "Security Enhancement of Over-The-Air Update for Connected Vehicles." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533246722910754.
Full textKulikauskas, Kristijonas. "Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857.
Full textAutomobile security is always relevant. Existing security systems could be easily bypassed and are not a big barrier for thieves. So there is a necessity for a innovative authentication system. Biometrics consist of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It could be also used for automobile security. Finger vein comparison is a relatively new form of biometrics, which could also be used for authentication. Images of finger veins could be obtained illuminating fingers with near-infrared light. Those images are very unique and different for every person and every finger. In this research biometric authentication model for automobiles is developed and researched. Three image recognition algorythms were tested in the experiment, determining which one is less sensitive to resolution changes and noise. The results were given, proposing use of one algorythm, in our model of biometric authentication system for automobiles.
Studnia, Ivan. "Détection d'intrusion pour des réseaux embarqués automobiles : une approche orientée langage." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0048/document.
Full textIn today’s automobiles, embedded computers, or ECUs (Electronic Control Units) are responsible for an increasing number of features in a vehicle. In order to coordinate their actions, these computers are able to exchange data over communication buses, effectively constituting an embedded network. While this network could previously be considered a closed system, the addition of means of communication in automobiles has opened this network to the outside world, thus raising many security issues.Our research work focuses on these issues and aims at proposing efficient architectural security mechanisms for protecting embedded automotive networks. The security of embedded automotive systems being a relatively recent topic, we first put a strong focus on defining the context. For that purpose, we describe the threats that can target a car’s embedded systems, provide a classification of the possible attack scenarios and present a survey of protection mechanisms in embedded automotive networks.Then, in order to complement the preventive security means that aim at stopping an attacker from entering the embedded network, we introduce an Intrusion Detection System (IDS) fit for vehicular networks. Leveraging the high predictability of embedded automotive systems, we use language theory to elaborate a set of attack signatures derived from behavioral models of the automotive calculators in order to detect a malicious sequence of messages transiting through the internal network. After a formal description of our IDS, we present a first batch of experiments aimed at validating our approach and assessing its performances
Berg, Hans-Yngve. "Understanding Subgroups of Novice Drivers : A Basis for Increased Safety and Health." Doctoral thesis, Linköping : Univ, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5037.
Full textHoversten, Shanna. "Electric Vehicles: Market Opportunities in China." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/1.
Full textCECCARELLI, BRUNO. "La securite actuelle en rallye automobile." Nice, 1990. http://www.theses.fr/1990NICE6566.
Full textSemančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.
Full textJANKOWSKI, JEAN-JACQUES. "Plaies intestinales par la ceinture de securite : a propos de deux cas." Nice, 1994. http://www.theses.fr/1994NICE6565.
Full textSchweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0062/document.
Full textElectronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
Books on the topic "Automobile security"
Deatherage, Robert H. Survival driving: Staying alive on the world's most dangerous roads. Boulder, Colo: Paladin Press, 2006.
Find full textYates, Charlotte Alyce Bronwen, 1955- and Leach Belinda 1954-, eds. Negotiating risk, seeking security, eroding solidarity: Life and work on the border. Halifax, N.S: Fernwood, 2012.
Find full textBetriebliches Co-Management und Standortkonkurrenz: Gewerkschaftliche Solidarität und Beschäftigungssicherung im Europäischen Betriebsrat. Münster: Westfälisches Dampfboot, 2014.
Find full textQuality, United States Congress House Committee on Energy and Commerce Subcommittee on Energy and Air. Climate change and energy security: Perspectives from the automobile industry : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, first session, March 14, 2007. Washington: U.S. G.P.O., 2008.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Energy and Air Quality. Climate change and energy security: Perspectives from the automobile industry : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, first session, March 14, 2007. Washington: U.S. G.P.O., 2008.
Find full textWebb, Barry. Preventing car crime in car parks. London: Home Office, Crime Prevention Unit, 1992.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. National security, safety, technology, and employment implications of increasing CAFE standards: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, January 24, 2002. Washington: U.S. G.P.O., 2006.
Find full textUnderstanding car parks, crime, and CCTV: Evaluation lessons from safer cities. London: Home Office Police Dept., 1993.
Find full textClarke, R. V. G. Thefts of and from cars in parking facilities. Washington, D.C: U.S. Dept. of Justice, Office of Community Oriented Policing Services, 2002.
Find full textGifford, J. Daniel. The automotive security system design handbook. Blue Ridge Summit, PA: Tab Books, 1985.
Find full textBook chapters on the topic "Automobile security"
Liaigre, David. "Securing Automobile Architectures." In Security of Computer Architectures, 345–77. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch9.
Full textChakravarty, Saptarshi, Aman Srivastava, Amrita Biswas, Kathyaini Rao, and Gargee Phukan. "Embedded Automobile Based Vehicular Security System." In Advances in Communication, Devices and Networking, 361–66. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4932-8_40.
Full textPawar, Mahesh R., and Imdad Rizvi. "Face Authentication and IOT-Based Automobile Security and Driver Surveillance System." In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 679–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00665-5_67.
Full textZhong, WeiSheng, and YaPing Wang. "Design of Automobile Intelligence Security Control System Based on Microcontroller AT89C51." In Advances in Intelligent and Soft Computing, 299–303. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28655-1_47.
Full textXue, Jing, and Meiqing Zhang. "Analysis and Suggestions of Tax Policy About Chinese Automobile Consumption." In Proceedings of 2014 1st International Conference on Industrial Economics and Industrial Security, 269–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44085-8_40.
Full textAgrawal, Mukesh Prasad, and Atma Ram Gupta. "TRAX: Smart Mobile Application to Improve the Safety and Security of Automobile Vehicles." In International Conference on Innovative Computing and Communications, 191–99. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2324-9_19.
Full textDummer, G. W. A. "A Concise History of Industrial, Automobile, Medical, Educational, Office, Banking, Consumer and Security Electronics." In Electronic Inventions and Discoveries, 51–57. Boca Raton: Routledge, 2021. http://dx.doi.org/10.1201/9780203758649-9.
Full textHakkala, Antti, and Olli I. Heimo. "Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service?" In Advances in Intelligent Systems and Computing, 121–37. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29513-4_9.
Full textChen, Patrick S., K. C. Chang, Tai-Ping Hsing, and Shihchieh Chou. "Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database." In Intelligence and Security Informatics, 91–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734628_12.
Full textKoscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. "Experimental Security Analysis of a Modern Automobile." In The Ethics of Information Technologies, 119–34. Routledge, 2020. http://dx.doi.org/10.4324/9781003075011-10.
Full textConference papers on the topic "Automobile security"
Goldstein, Dennis H. "Polarization measurements of automobile paints." In SPIE Defense and Security Symposium, edited by David B. Chenault and Dennis H. Goldstein. SPIE, 2008. http://dx.doi.org/10.1117/12.780054.
Full textSpellenberg, Bernd, Jurgen Zettner, Oliver Schreer, Michael Bassler, Manfred Haller, Thomas Lenzi, and Thomas Hierl. "Inspection of laser-seam welds in automobile manufacturing." In Defense and Security, edited by G. Raymond Peacock, Douglas D. Burleigh, and Jonathan J. Miles. SPIE, 2005. http://dx.doi.org/10.1117/12.603771.
Full textRao, A. Trinadha, K. Rajeswari, K. Sravan Kumar, K. Uma Devi, M. Mouna Deepika, and D. Syam Prakash. "Multi Purpose Security System in Automobile Industry." In 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018. http://dx.doi.org/10.1109/iccsp.2018.8524331.
Full textKoscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. "Experimental Security Analysis of a Modern Automobile." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.34.
Full textMitchell, Maury, Matthe Hudnall, David Brown, David Cordes, Randy Smith, and Allen Parrish. "A Host Architecture for Automobile License Plate Recognition." In 2007 IEEE Intelligence and Security Informatics. IEEE, 2007. http://dx.doi.org/10.1109/isi.2007.379539.
Full textBetancur Ramírez, Jose Alejandro, and Gilberto Osorio Gómez. "General implications of HUD systems applied to automobile industries." In SPIE Defense, Security, and Sensing, edited by John Tudor Thomas, Daniel D. Desjardins, Jeff J. Güell, and Kenneth L. Bernier. SPIE, 2011. http://dx.doi.org/10.1117/12.883726.
Full textNi, Xiao, Weiren Shi, and Victor Foo Siang Fook. "AES Security Protocol Implementation for Automobile Remote Keyless System." In 2007 IEEE 65th Vehicular Technology Conference. IEEE, 2007. http://dx.doi.org/10.1109/vetecs.2007.520.
Full textNainan, Sumita, Akshay Ramesh, Vipul Gohil, and Jaykumar Chaudhary. "Speech controlled Automobile with Three-Level Biometric Security System." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464003.
Full textLa-fang, Wang, Wen Wen, Lai Ming-yong, Xie Rui, and Liu Jun. "Measurement of the automobile industrial security degree in China." In 2010 International Conference on Management Science and Engineering (ICMSE). IEEE, 2010. http://dx.doi.org/10.1109/icmse.2010.5719806.
Full textBetancur Ramírez, J. Alejandro. "Design considerations of HUD projection systems applied to automobile industry." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.918698.
Full textReports on the topic "Automobile security"
Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.
Full textLazonick, William, Philip Moss, and Joshua Weitz. The Unmaking of the Black Blue-Collar Middle Class. Institute for New Economic Thinking Working Paper Series, May 2021. http://dx.doi.org/10.36687/inetwp159.
Full text