Academic literature on the topic 'Automobile security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Automobile security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Automobile security"

1

Okegbile, Samuel Dayo, Segun Aina, Sanmi Akinmodun, Adeniran Ishola Oluwaranti, and Aderonke Rasheedat Lawal. "A Multimodal Approach to Enhancing Automobile Security." International Journal of Computer Vision and Image Processing 9, no. 2 (April 2019): 32–47. http://dx.doi.org/10.4018/ijcvip.2019040103.

Full text
Abstract:
The continuous increase in use of the automobiles has resulted in increase in vehicular traffic and social vices such as theft, thus necessitating efforts for improving automobile security. As a result of this, various solutions such as satellite monitoring and General Packet Radio Services have been adopted to track vehicle locations over time. This article combines the uniqueness of an automobile plate number and the face(s) of an authorized vehicle driver to enhance the automobile security system, hence eliminating the inefficiency of the existing tag system while reducing the cases of unauthorized automobile use and outright theft. A weighted score approach was used in evaluating the efficiency of the character recognition subsystem with an accuracy of 89.3% recorded. The face recognition subsystem also achieved reliable genuine and an imposter attempt at 0.0 confidence level. The designed system ensured security of an automobile through the combination of a plate number and image recognition, thereby preventing an unauthorized driver from taking a vehicle out of a controlled area.
APA, Harvard, Vancouver, ISO, and other styles
2

Brooks, R. R., S. Sander, Juan Deng, and Joachim Taiber. "Automobile security concerns." IEEE Vehicular Technology Magazine 4, no. 2 (June 2009): 52–64. http://dx.doi.org/10.1109/mvt.2009.932539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adhikari, Deependra, Kabita Nepal, Deepak Rasaily, and Aarfin Ashraf. "Advanced Security System for Automobile." International Journal of Engineering Trends and Technology 33, no. 7 (March 25, 2016): 365–68. http://dx.doi.org/10.14445/22315381/ijett-v33p270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Babu, Prathibha S., K. L. Sree Harsha, A. Santosh, M. Naga Kaushik, and K. Anil Kumar. "Arduino Based Automobile Security System." Indian Journal of Science and Technology 11, no. 23 (June 1, 2018): 1–8. http://dx.doi.org/10.17485/ijst/2018/v11i23/125627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lei, Qiong Hong. "The Study of Holonic Control Strategy in Modern Automobile." Advanced Materials Research 308-310 (August 2011): 2258–61. http://dx.doi.org/10.4028/www.scientific.net/amr.308-310.2258.

Full text
Abstract:
The popularity of modern automobiles requires better using performances of them, even better security and environmental protection. So, there are some electrically controlled equipment used in a modern automobile. Since this, it is urgently necessary to develop an integrated or synthetical control strategy in automobiles by using new technologies and advanced algorithms. In this paper, a new method based on the holon conception is presented to study the synthetical control in automobiles [1-3]. The control system is divided into three levels and is defined as three holons, and the function of every holon level is discussed. The coordinated model is established to study the coordination strategy among different holon levels, which will help to improve the synthetical control efficiency, security, stability and environmental protection and etc. of modern automobiles [4-5].
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Xiao Yan, Pei Xin Qu, and Xiao Jing Li. "Braking Performance Study for Automobile with Numerical Simulation." Applied Mechanics and Materials 155-156 (February 2012): 1159–63. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.1159.

Full text
Abstract:
The excellent braking characteristics is a key security measure for automobile operation. Braking system is used in modern automobiles for enhanced safety and reliability. During automobile design stage, a full model of automobile is established in ADAMS software circumstance in according to structural feature and main parameters. The article focuses on modeling and parameter settings of brake system, tire system and body system. Based on the requirement of country standard and national standard, the braking performance analysis and appraise is carried out in this study, at the same time, the braking performance is optimized.
APA, Harvard, Vancouver, ISO, and other styles
7

B, Jignesh. "Innovative Automobile Security System Using Various Security Modules." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 583–86. http://dx.doi.org/10.17762/ijritcc2321-8169.150233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiu Feng, and Gang Cui. "Multifunction GPS/GPRS Automobile Security System." Advanced Materials Research 433-440 (January 2012): 629–34. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.629.

Full text
Abstract:
Based on ARM,multifuncttion GPS/GPRS automobile security system was designed,which focused on security and detectiong.The system combines with detection technology, sensor technology, GPS technology, GPRS technology and digital filtering technology.This system was discussed from software and hardware. Related math model was established. Corresponding test was been brought forward to improve system reliability. Average filtering method and median filtering algorithm have been used to inhibiting interference signals with variety of frequency in software. In this paper,the advantages of this system have been discussed.The embeded system realizes the function with characteristics of low cost, high performance, real-time and reliability ,it has high practical value.
APA, Harvard, Vancouver, ISO, and other styles
9

., N. Chandra Kumar. "SMART AUTOMOBILE SECURITY SYSTEM USING LABVIEW." International Journal of Research in Engineering and Technology 03, no. 14 (March 25, 2014): 35–38. http://dx.doi.org/10.15623/ijret.2014.0314007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Automobile security"

1

Kalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chawan, Akshay. "Security Enhancement of Over-The-Air Update for Connected Vehicles." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533246722910754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kulikauskas, Kristijonas. "Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857.

Full text
Abstract:
Automobilių apsauga visada buvo, yra ir bus aktuali. Esamos apsaugos priemonės nesunkiai apeinamos ir nesudaro didelių kliūčių, norint transporto priemonę pasisavinti. Reikalinga naujoviška vairuotojo autentifikavimo sistema, galinti sumažinti šią, pasisavinimo tikimybę. Tam tinka biometrija – asmens bruožų ar charakteristikų statistinė analizė ir nustatymas. Juos nustačius, gali būti naudojami asmens autentifikacijai. Tai daroma lyginant su anksčiau užfiksuotu šablonu. Naudojama šioms autentifikacijoms: kompiuteriuose tinklų, praėjimo kontrolės, bankomatuose, apsipirkimams kreditinėmis kortelėmis, mobiliuosiuose telefonuose, delniniuose kompiuteriuose, medicininių įrašų valdymui, nuotoliniame mokymesi ir t.t. Pirštų kraujagyslės – nauja biometrinės autentifikacijos forma. Kadangi kraujagyslės yra po oda, jos yra nematomos apšviečiant natūralia šviesa. Tačiau jos puikiai matomos apšvietus artima infraraudoniems spinduliams šviesa. Šiame tyrime buvo sukurtas ir ištirtas biometrinės autentifikacijos automobiliams modelis. Ištirtas trijų atvaizdų apdorojimo algoritmų tinkamums, nustatant kuris jų mažiausia jautrus raiškos ir triukšmo pasikeitimams. Jį ir siūlome naudoti šiame autentifikacijos modelyje.
Automobile security is always relevant. Existing security systems could be easily bypassed and are not a big barrier for thieves. So there is a necessity for a innovative authentication system. Biometrics consist of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It could be also used for automobile security. Finger vein comparison is a relatively new form of biometrics, which could also be used for authentication. Images of finger veins could be obtained illuminating fingers with near-infrared light. Those images are very unique and different for every person and every finger. In this research biometric authentication model for automobiles is developed and researched. Three image recognition algorythms were tested in the experiment, determining which one is less sensitive to resolution changes and noise. The results were given, proposing use of one algorythm, in our model of biometric authentication system for automobiles.
APA, Harvard, Vancouver, ISO, and other styles
4

Studnia, Ivan. "Détection d'intrusion pour des réseaux embarqués automobiles : une approche orientée langage." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0048/document.

Full text
Abstract:
Les calculateurs embarqués dans les automobiles, ou ECU (Electronic Control Unit) sont responsables d’un nombre croissant de fonctionnalités au sein du véhicule. Pour pouvoir coordonner leurs actions, ces calculateurs s’échangent des données via des bus de communication et forment ainsi un véritable réseau embarqué. Si historiquement ce réseau pouvait être considéré comme un système fermé, l’apparition de nombreux moyens de communication dans les automobiles a ouvert ce réseau au monde extérieur et fait émerger de nombreuses problématiques de sécurité dans ce domaine.Nos travaux s’inscrivent dans une démarche de mise en place de moyens de sécurité-immunité dans les réseaux automobiles. La thématique de la sécurité-immunité dans l’automobile étant un sujet relativement récent, un effort particulier a été apporté à la définition du contexte. Ainsi, dans ce manuscrit, nous décrivons les menaces qui peuvent cibler ces systèmes embarqués, proposons une classification des scénarios d’attaques puis présentons les différents mécanismes de sécurité pouvant être appliqués aux systèmes embarqués d’une automobile.Ensuite, afin de compléter les mesures de sécurité préventives mises en place pour empêcher un attaquant de pénétrer au coeur du réseau embarqué, nous proposons dans cette thèse un système de détection d’intrusion pour les réseaux automobiles embarqués. Celui-ci, conçu à partir des spécifications du ou des systèmes à surveiller, intègre notamment des mécanismes permettant d’effectuer une corrélation des messages observés sur le réseau afin d’identifier des séquences de messages suspectes. Après avoir décrit formellement le fonctionnement de notre système de détection, nous présentons de premières expérimentations visant à valider notre méthode et à évaluer ses performances
In today’s automobiles, embedded computers, or ECUs (Electronic Control Units) are responsible for an increasing number of features in a vehicle. In order to coordinate their actions, these computers are able to exchange data over communication buses, effectively constituting an embedded network. While this network could previously be considered a closed system, the addition of means of communication in automobiles has opened this network to the outside world, thus raising many security issues.Our research work focuses on these issues and aims at proposing efficient architectural security mechanisms for protecting embedded automotive networks. The security of embedded automotive systems being a relatively recent topic, we first put a strong focus on defining the context. For that purpose, we describe the threats that can target a car’s embedded systems, provide a classification of the possible attack scenarios and present a survey of protection mechanisms in embedded automotive networks.Then, in order to complement the preventive security means that aim at stopping an attacker from entering the embedded network, we introduce an Intrusion Detection System (IDS) fit for vehicular networks. Leveraging the high predictability of embedded automotive systems, we use language theory to elaborate a set of attack signatures derived from behavioral models of the automotive calculators in order to detect a malicious sequence of messages transiting through the internal network. After a formal description of our IDS, we present a first batch of experiments aimed at validating our approach and assessing its performances
APA, Harvard, Vancouver, ISO, and other styles
5

Berg, Hans-Yngve. "Understanding Subgroups of Novice Drivers : A Basis for Increased Safety and Health." Doctoral thesis, Linköping : Univ, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoversten, Shanna. "Electric Vehicles: Market Opportunities in China." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/1.

Full text
Abstract:
Electric vehicles (EVs) offer an exciting opportunity in China both in terms of the potential to build a domestic manufacturing base and the potential to create a strong domestic market for the product. The Chinese nation stands to benefit from both supply-side and demand-side promotion due to the economic stimulus from EV manufacturing and export, the environmental benefits of reduced air pollution and reduced greenhouse gas emissions, and the energy security benefits of transitioning away from foreign oil dependence. The Chinese have several advantages when it comes to stimulating EV industry development and EV deployment, including: leadership in battery technology, great potential for cost competitiveness, an enormous and emerging number of new car buyers, and high level government support. Yet a number of challenges must be taken into account as well, including: shortfalls in overall automobile R&D spending, consumer concerns about Chinese cars’ safety and reliability, enhancing the appeal of the Chinese brand, and heavy national infrastructure demands. This paper will seek to examine the opportunities and challenges associated with EV deployment in China and identify industry actions and policy measures to facilitate the process.
APA, Harvard, Vancouver, ISO, and other styles
7

CECCARELLI, BRUNO. "La securite actuelle en rallye automobile." Nice, 1990. http://www.theses.fr/1990NICE6566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Semančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.

Full text
Abstract:
This thesis deals with car remote keyless systems, analysis of these systems and most common attacks on these systems. It also deals with design and realisation of secure car remote keyless system, which should be resistant to said attacks, and with design and realisation of attack against existing car remote keyless system.
APA, Harvard, Vancouver, ISO, and other styles
9

JANKOWSKI, JEAN-JACQUES. "Plaies intestinales par la ceinture de securite : a propos de deux cas." Nice, 1994. http://www.theses.fr/1994NICE6565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0062/document.

Full text
Abstract:
L'équipement électronique de bord est maintenant devenue partie intégrante de l'architecture réseau des véhicules. Elle s’appuie sur l'interconnexion de microcontroleurs appelés ECUs par des bus divers. On commence maintenant à connecter ces ECUs au monde extérieur, comme le montrent les systèmes de navigation, de divertissement, ou de communication mobile embarqués, et les fonctionnalités Car2X. Des analyses récentes ont montré de graves vulnérabilités des ECUs et protocoles employés qui permettent à un attaquant de prendre le contrôle du véhicule. Comme les systèmes critiques du véhicule ne peuvent plus être complètement isolés, nous proposons une nouvelle approche pour sécuriser l'informatique embarquée combinant des mécanismes à différents niveaux de la pile protocolaire comme des environnements d'exécution. Nous décrivons nos protocoles sécurisés qui s'appuient sur une cryptographie efficace et intégrée au paradigme de communication dominant dans l'automobile et sur des modules de sécurité matériels fournissant un stockage sécurisé et un noyau de confiance. Nous décrivons aussi comment surveiller les flux d'information distribués dans le véhicule pour assurer une exécution conforme à la politique de sécurité des communications. L'instrumentation binaire du code, nécessaire pour l’industrialisation, est utilisée pour réaliser cette surveillance durant l’exécution (par data tainting) et entre ECUs (dans l’intergiciel). Nous évaluons la faisabilité de nos mécanismes pour sécuriser la communication sur le bus CAN aujourd'hui omniprésent dans les véhicules. Une preuve de concept montre aussi la faisabilité d'intégrer des mécanismes de sécurité dans des véhicules réels
Electronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Automobile security"

1

Deatherage, Robert H. Survival driving: Staying alive on the world's most dangerous roads. Boulder, Colo: Paladin Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yates, Charlotte Alyce Bronwen, 1955- and Leach Belinda 1954-, eds. Negotiating risk, seeking security, eroding solidarity: Life and work on the border. Halifax, N.S: Fernwood, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Betriebliches Co-Management und Standortkonkurrenz: Gewerkschaftliche Solidarität und Beschäftigungssicherung im Europäischen Betriebsrat. Münster: Westfälisches Dampfboot, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Quality, United States Congress House Committee on Energy and Commerce Subcommittee on Energy and Air. Climate change and energy security: Perspectives from the automobile industry : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, first session, March 14, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Energy and Air Quality. Climate change and energy security: Perspectives from the automobile industry : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, first session, March 14, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Webb, Barry. Preventing car crime in car parks. London: Home Office, Crime Prevention Unit, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. National security, safety, technology, and employment implications of increasing CAFE standards: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, January 24, 2002. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Understanding car parks, crime, and CCTV: Evaluation lessons from safer cities. London: Home Office Police Dept., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Clarke, R. V. G. Thefts of and from cars in parking facilities. Washington, D.C: U.S. Dept. of Justice, Office of Community Oriented Policing Services, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gifford, J. Daniel. The automotive security system design handbook. Blue Ridge Summit, PA: Tab Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Automobile security"

1

Liaigre, David. "Securing Automobile Architectures." In Security of Computer Architectures, 345–77. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chakravarty, Saptarshi, Aman Srivastava, Amrita Biswas, Kathyaini Rao, and Gargee Phukan. "Embedded Automobile Based Vehicular Security System." In Advances in Communication, Devices and Networking, 361–66. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4932-8_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pawar, Mahesh R., and Imdad Rizvi. "Face Authentication and IOT-Based Automobile Security and Driver Surveillance System." In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 679–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00665-5_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhong, WeiSheng, and YaPing Wang. "Design of Automobile Intelligence Security Control System Based on Microcontroller AT89C51." In Advances in Intelligent and Soft Computing, 299–303. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28655-1_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xue, Jing, and Meiqing Zhang. "Analysis and Suggestions of Tax Policy About Chinese Automobile Consumption." In Proceedings of 2014 1st International Conference on Industrial Economics and Industrial Security, 269–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44085-8_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Mukesh Prasad, and Atma Ram Gupta. "TRAX: Smart Mobile Application to Improve the Safety and Security of Automobile Vehicles." In International Conference on Innovative Computing and Communications, 191–99. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2324-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dummer, G. W. A. "A Concise History of Industrial, Automobile, Medical, Educational, Office, Banking, Consumer and Security Electronics." In Electronic Inventions and Discoveries, 51–57. Boca Raton: Routledge, 2021. http://dx.doi.org/10.1201/9780203758649-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hakkala, Antti, and Olli I. Heimo. "Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service?" In Advances in Intelligent Systems and Computing, 121–37. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29513-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Patrick S., K. C. Chang, Tai-Ping Hsing, and Shihchieh Chou. "Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database." In Intelligence and Security Informatics, 91–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734628_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. "Experimental Security Analysis of a Modern Automobile." In The Ethics of Information Technologies, 119–34. Routledge, 2020. http://dx.doi.org/10.4324/9781003075011-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Automobile security"

1

Goldstein, Dennis H. "Polarization measurements of automobile paints." In SPIE Defense and Security Symposium, edited by David B. Chenault and Dennis H. Goldstein. SPIE, 2008. http://dx.doi.org/10.1117/12.780054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spellenberg, Bernd, Jurgen Zettner, Oliver Schreer, Michael Bassler, Manfred Haller, Thomas Lenzi, and Thomas Hierl. "Inspection of laser-seam welds in automobile manufacturing." In Defense and Security, edited by G. Raymond Peacock, Douglas D. Burleigh, and Jonathan J. Miles. SPIE, 2005. http://dx.doi.org/10.1117/12.603771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rao, A. Trinadha, K. Rajeswari, K. Sravan Kumar, K. Uma Devi, M. Mouna Deepika, and D. Syam Prakash. "Multi Purpose Security System in Automobile Industry." In 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018. http://dx.doi.org/10.1109/iccsp.2018.8524331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. "Experimental Security Analysis of a Modern Automobile." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mitchell, Maury, Matthe Hudnall, David Brown, David Cordes, Randy Smith, and Allen Parrish. "A Host Architecture for Automobile License Plate Recognition." In 2007 IEEE Intelligence and Security Informatics. IEEE, 2007. http://dx.doi.org/10.1109/isi.2007.379539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Betancur Ramírez, Jose Alejandro, and Gilberto Osorio Gómez. "General implications of HUD systems applied to automobile industries." In SPIE Defense, Security, and Sensing, edited by John Tudor Thomas, Daniel D. Desjardins, Jeff J. Güell, and Kenneth L. Bernier. SPIE, 2011. http://dx.doi.org/10.1117/12.883726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ni, Xiao, Weiren Shi, and Victor Foo Siang Fook. "AES Security Protocol Implementation for Automobile Remote Keyless System." In 2007 IEEE 65th Vehicular Technology Conference. IEEE, 2007. http://dx.doi.org/10.1109/vetecs.2007.520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nainan, Sumita, Akshay Ramesh, Vipul Gohil, and Jaykumar Chaudhary. "Speech controlled Automobile with Three-Level Biometric Security System." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

La-fang, Wang, Wen Wen, Lai Ming-yong, Xie Rui, and Liu Jun. "Measurement of the automobile industrial security degree in China." In 2010 International Conference on Management Science and Engineering (ICMSE). IEEE, 2010. http://dx.doi.org/10.1109/icmse.2010.5719806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Betancur Ramírez, J. Alejandro. "Design considerations of HUD projection systems applied to automobile industry." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.918698.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Automobile security"

1

Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.

Full text
Abstract:
As automobiles morph from stand-alone mechanical objects to highly connected, autonomous systems with increasing amounts of electronic components. To manage these complex systems, some semblance of in-car decision-making is also being built and networked to a cloud architecture. This cloud can also enable even deeper capabilities within the broader automotive ecosystem. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
APA, Harvard, Vancouver, ISO, and other styles
2

Lazonick, William, Philip Moss, and Joshua Weitz. The Unmaking of the Black Blue-Collar Middle Class. Institute for New Economic Thinking Working Paper Series, May 2021. http://dx.doi.org/10.36687/inetwp159.

Full text
Abstract:
In the decade after the Civil Rights Act of 1964, African Americans made historic gains in accessing employment opportunities in racially integrated workplaces in U.S. business firms and government agencies. In the previous working papers in this series, we have shown that in the 1960s and 1970s, Blacks without college degrees were gaining access to the American middle class by moving into well-paid unionized jobs in capital-intensive mass production industries. At that time, major U.S. companies paid these blue-collar workers middle-class wages, offered stable employment, and provided employees with health and retirement benefits. Of particular importance to Blacks was the opening up to them of unionized semiskilled operative and skilled craft jobs, for which in a number of industries, and particularly those in the automobile and electronic manufacturing sectors, there was strong demand. In addition, by the end of the 1970s, buoyed by affirmative action and the growth of public-service employment, Blacks were experiencing upward mobility through employment in government agencies at local, state, and federal levels as well as in civil-society organizations, largely funded by government, to operate social and community development programs aimed at urban areas where Blacks lived. By the end of the 1970s, there was an emergent blue-collar Black middle class in the United States. Most of these workers had no more than high-school educations but had sufficient earnings and benefits to provide their families with economic security, including realistic expectations that their children would have the opportunity to move up the economic ladder to join the ranks of the college-educated white-collar middle class. That is what had happened for whites in the post-World War II decades, and given the momentum provided by the dominant position of the United States in global manufacturing and the nation’s equal employment opportunity legislation, there was every reason to believe that Blacks would experience intergenerational upward mobility along a similar education-and-employment career path. That did not happen. Overall, the 1980s and 1990s were decades of economic growth in the United States. For the emerging blue-collar Black middle class, however, the experience was of job loss, economic insecurity, and downward mobility. As the twentieth century ended and the twenty-first century began, moreover, it became apparent that this downward spiral was not confined to Blacks. Whites with only high-school educations also saw their blue-collar employment opportunities disappear, accompanied by lower wages, fewer benefits, and less security for those who continued to find employment in these jobs. The distress experienced by white Americans with the decline of the blue-collar middle class follows the downward trajectory that has adversely affected the socioeconomic positions of the much more vulnerable blue-collar Black middle class from the early 1980s. In this paper, we document when, how, and why the unmaking of the blue-collar Black middle class occurred and intergenerational upward mobility of Blacks to the college-educated middle class was stifled. We focus on blue-collar layoffs and manufacturing-plant closings in an important sector for Black employment, the automobile industry from the early 1980s. We then document the adverse impact on Blacks that has occurred in government-sector employment in a financialized economy in which the dominant ideology is that concentration of income among the richest households promotes productive investment, with government spending only impeding that objective. Reduction of taxes primarily on the wealthy and the corporate sector, the ascendancy of political and economic beliefs that celebrate the efficiency and dynamism of “free market” business enterprise, and the denigration of the idea that government can solve social problems all combined to shrink government budgets, diminish regulatory enforcement, and scuttle initiatives that previously provided greater opportunity for African Americans in the government and civil-society sectors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography