Dissertations / Theses on the topic 'Automobile security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Automobile security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Full textChawan, Akshay. "Security Enhancement of Over-The-Air Update for Connected Vehicles." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533246722910754.
Full textKulikauskas, Kristijonas. "Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857.
Full textAutomobile security is always relevant. Existing security systems could be easily bypassed and are not a big barrier for thieves. So there is a necessity for a innovative authentication system. Biometrics consist of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It could be also used for automobile security. Finger vein comparison is a relatively new form of biometrics, which could also be used for authentication. Images of finger veins could be obtained illuminating fingers with near-infrared light. Those images are very unique and different for every person and every finger. In this research biometric authentication model for automobiles is developed and researched. Three image recognition algorythms were tested in the experiment, determining which one is less sensitive to resolution changes and noise. The results were given, proposing use of one algorythm, in our model of biometric authentication system for automobiles.
Studnia, Ivan. "Détection d'intrusion pour des réseaux embarqués automobiles : une approche orientée langage." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0048/document.
Full textIn today’s automobiles, embedded computers, or ECUs (Electronic Control Units) are responsible for an increasing number of features in a vehicle. In order to coordinate their actions, these computers are able to exchange data over communication buses, effectively constituting an embedded network. While this network could previously be considered a closed system, the addition of means of communication in automobiles has opened this network to the outside world, thus raising many security issues.Our research work focuses on these issues and aims at proposing efficient architectural security mechanisms for protecting embedded automotive networks. The security of embedded automotive systems being a relatively recent topic, we first put a strong focus on defining the context. For that purpose, we describe the threats that can target a car’s embedded systems, provide a classification of the possible attack scenarios and present a survey of protection mechanisms in embedded automotive networks.Then, in order to complement the preventive security means that aim at stopping an attacker from entering the embedded network, we introduce an Intrusion Detection System (IDS) fit for vehicular networks. Leveraging the high predictability of embedded automotive systems, we use language theory to elaborate a set of attack signatures derived from behavioral models of the automotive calculators in order to detect a malicious sequence of messages transiting through the internal network. After a formal description of our IDS, we present a first batch of experiments aimed at validating our approach and assessing its performances
Berg, Hans-Yngve. "Understanding Subgroups of Novice Drivers : A Basis for Increased Safety and Health." Doctoral thesis, Linköping : Univ, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5037.
Full textHoversten, Shanna. "Electric Vehicles: Market Opportunities in China." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/1.
Full textCECCARELLI, BRUNO. "La securite actuelle en rallye automobile." Nice, 1990. http://www.theses.fr/1990NICE6566.
Full textSemančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.
Full textJANKOWSKI, JEAN-JACQUES. "Plaies intestinales par la ceinture de securite : a propos de deux cas." Nice, 1994. http://www.theses.fr/1994NICE6565.
Full textSchweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0062/document.
Full textElectronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
Maître, Anne. "Les peintures polyuréthanes en réparation automobile : développement de méthodes d'évaluation des niveaux d'exposition et approche de la toxicité humaine." Université Joseph Fourier (Grenoble), 1996. http://www.theses.fr/1996GRE10147.
Full textKhlifi, Tahar. "Représentation, communication, prévention : l'automobile et l'accident de la circulation." Paris, EHESS, 1999. http://www.theses.fr/1999EHES0058.
Full textDerbel, Oussama. "Modélisation microscopique et macroscopique du trafic : Impact des véhicules automatisés sur la sécurité du conducteur." Thesis, Mulhouse, 2014. http://www.theses.fr/2014MULH4332/document.
Full textMy thesis can be summarized in three parts: The first part consists in studying the impact of the low speed automation on driver safety, traffic capacity, fuel consumption and vehicle emissions. As a first step, a pattern of mixed road traffic is established. This one is defined by the coexistence of two driving styles: the first one is the manual and the second one is the automated. Secondly, the scenarios and the associated indicators have been developed. In this context a traffic simulator was developed with the C programming language using the OpenGl library for the graphical interface. Results show that the increase of automated vehicles presence traffic safety increases in case of accidents scenarios as well as in the case of without accidents. Moreover, the impact of automated vehicles on fuel consumption and pollutant emissions only appears when it comes to long path. The second part of my thesis consists in improving the Intelligent Driver Model (IDM) model, Adaptive Cruise Control (ACC) to represent the automated driving in traffic, to overcome its drawbacks. In this context, a new version is developed. The main idea is to take into account not only the state of the preceding vehicle but also the tail vehicle. This new model shows better performance in queue stabilization in terms of accelerations and velocities. The third part is devoted to the macroscopic traffic modeling in which we study the fundamental diagram. The new developed macroscopic model is based on microscopic data given by the Intelligent Driver Model simulation. Then, the traffic density and velocity were identified by non-linear regression. The new macroscopic velocity-density model has three advantages: Knowledge of the stable velocity and density within the first seconds of simulation by identifying. Ability to find existing models in the literature by setting some of its parameters. Calibration with a minimum of error for different traffic situations (eg congestion, free)
Orfila, Olivier. "Influence de l'infrastructure routière sur l'occurrence des pertes de contrôle de véhicules légers en virage : Modélisation et validation sur site expérimental." Phd thesis, Evry-Val d'Essonne, 2009. http://tel.archives-ouvertes.fr/tel-00968823.
Full textMinoiu, Enache Nicoleta. "Assistance préventive à la sortie de voie." Phd thesis, Université d'Evry-Val d'Essonne, 2008. http://tel.archives-ouvertes.fr/tel-00364073.
Full textGoyat, Yann. "Estimation précise des trajectoires de véhicule par un système optique." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2008. http://tel.archives-ouvertes.fr/tel-00399848.
Full textRusso, Jean-Nicola. "Evaluation du risque de téléscopage dans un contexte de véhicules communicants par la méthode des réseaux Bayésiens." Thesis, Mulhouse, 2018. http://www.theses.fr/2018MULH2947.
Full textTechnological advances and the globalization of transport have led to an increase flow of passengers. However, in the automotive sector, technical or human problems lead to accidents that still cause thousands of injuries and deaths each year. As a result, government authorities and car manufacturers are working on new regulations and technical advances to ensure safety of every road user. To ensure that cut of deaths and injuries, an interesting research approach is to merge information from the vehicle, the driver and the environment in order to warn the driver of the risk he is taking or even to act directly on the vehicle. Thus, after defining the risk we consider, we are interested here in its modelling and estimation in real time. In this context, the deceleration of the leading vehicle is monitored and studied then we analyze and process the data through a Bayesian network in order to evaluate the rear-end risk that will be shared through vehicular communication thanks to VANet
Bouchaala, Younes. "Gestion des messages de sécurité dans les réseaux VANET." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV101/document.
Full textQuality of Service (QoS) requirements for VANET applications vary depending on the nature and type of the application. Therefore, a communication protocol in VANETs must be able to meet various QoS requirements according to the type of traffic. In VANET, the transmission channel is shared by all the vehicles using the same radio frequency. A poor exploitation of the channel can therefore lead to collisions and wasted bandwidth. A MAC protocol must therefore be designed to share the channel between the different nodes in an efficient and fair way.In this thesis we present the following contributions:1- Analysis and improvement of diffusion in the IEEE 802.11 standard.2- Optimization of the CSMA technique for 1D and 2D networks.3- Design of an adaptive transmission algorithm that updates the Carrier Sense threshold to reach a target value.4- Study the gain obtained by the use of directional antennas for Aloha, non-slotted Aloha, and CSMA
Randriamasy, Malalatiana. "Localisation et transmissions sécurisées pour la communication Véhicule à Infrastructure (V2I) : Application au service de télépéage ITS-G5." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMR011/document.
Full textThe precise localization of vehicles and the security of communication are requirements that make almost of the services provided in intelligent transport systems (ITS) more reliable. In recent years, they have been the subject of numerous research projects for various fields of application. In this thesis, the context is the development of an electronic toll service using the ITS-G5 technology. This wireless communication technology initially allows the sharing of traffic safety information between vehicles (V2V), vehicle and infrastructure (V2I). In our work, we propose a tolling application using equipment operating in ITS-G5 embedded in the connected vehicles and roadside units. For this, ensuring both precise geolocation of the vehicles and security of communication are required to validate the transaction.In order to properly locate the vehicles during the toll crossing, our approach is based on the understanding of the kinematics of the vehicle through a suitable modeling from the data collected in the cooperative messages (called CAM: Cooperative Awareness Message). This approach aims to improve the geolocation information already present in the message. Our goal is to achieve vehicle localization with an accuracy lower than one meter to distinguish two adjacent vehicles. On the other hand, the proposed tolling protocol ensures the authentication of the equipment or entities involved in the exchange and the validation of the transaction, the integrity of the transmitted data as well as the confidentiality of the communication. In this way, we take into account the context of the wireless communication and the sensitivity of the exchanged data. Our two contributions are integrated in the implemented Proof of Concept of the tolling application using the ITS-G5 technology
Wu, Hang-Wu, and 吳漢武. "Designing Financial Pre-Order Security for Automobile Industry." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/81970942163375026877.
Full text國立交通大學
工業工程與管理系所
96
Payment deposit is for achieving pre-order trading guarantee in the present pre-order system. When buyer couldn’t execute the order in the future, the deposit belongs to seller who penalties for buyer defaulting. This research design pre-order security to substitute deposit in pre-order system. Payment premium is equal to deposit, and pre-order player could buy pre-order security to execute order to due date or sell during contract period in financial market. 1.Contract Design Pre-order security is the same deposit of pre-order promotion, and paying a little premium, has exercises the right to purchase underlying asset. Premium is calculated by underlying asset’s volatility so underlying asset price index could be established to provide for buying or selling pre-order security criterion. 2.System Design Issued company issue pre-order security business through underwriter opening subscription in primary market. After opening subscription period, pre-order security can be traded in secondary market to provide for transferring contract. Finally, take the automobile as the case, simulates due auto’s price with Monte Carlo method. To decide suitable premium and auto’s exercise price for issuer in the lowest exercise probability and auto’s profit.
Buys, Johannes Jacobus. "Hijacking of trucks with freight : a criminological analysis." Diss., 2003. http://hdl.handle.net/10500/1838.
Full textCriminology
M.A.
"An intelligent vehicle security system based on human behaviors modeling." 2006. http://library.cuhk.edu.hk/record=b5892893.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 99-106).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Overview --- p.2
Chapter 1.3 --- Organization of the Thesis --- p.3
Chapter 2 --- Related Research --- p.6
Chapter 2.1 --- Information Technology in Cars --- p.6
Chapter 2.2 --- Anti-theft Protection --- p.8
Chapter 2.3 --- Learning Human Behaviors --- p.10
Chapter 2.4 --- Neural Network Learning --- p.11
Chapter 3 --- Experimental Design --- p.14
Chapter 3.1 --- Overview --- p.14
Chapter 3.2 --- Driving Simulation Subsystem --- p.14
Chapter 3.3 --- Data Sensing and Capturing Subsystem --- p.15
Chapter 3.4 --- Data Analysis Subsystem --- p.17
Chapter 4 --- Data Preprocessing for Feature Selection --- p.23
Chapter 4.1 --- Introduction --- p.23
Chapter 4.2 --- Fast Fourier Transform --- p.23
Chapter 4.3 --- Principal Component Analysis --- p.24
Chapter 4.4 --- Independent Component Analysis --- p.26
Chapter 5 --- Classification via Support Vector Machine --- p.28
Chapter 5.1 --- Introduction --- p.28
Chapter 5.1.1 --- Why Using Support Vector Machine --- p.28
Chapter 5.1.2 --- Mathematic Description --- p.29
Chapter 5.2 --- Problem Formulation --- p.31
Chapter 5.3 --- Approach --- p.31
Chapter 5.4 --- Experimental Results --- p.34
Chapter 5.4.1 --- Preprocess Data Analysis --- p.34
Chapter 5.4.2 --- Models Design --- p.37
Chapter 5.5 --- Discussion --- p.44
Chapter 6 --- Evaluation via Hidden Markov Model --- p.47
Chapter 6.1 --- Introduction --- p.47
Chapter 6.1.1 --- Why Using Hidden Markov Model --- p.48
Chapter 6.1.2 --- Mathematic Description --- p.50
Chapter 6.2 --- Problem Formulation --- p.51
Chapter 6.3 --- Approach --- p.53
Chapter 6.4 --- Experimental Results --- p.56
Chapter 6.4.1 --- Model-to-model Measure --- p.56
Chapter 6.4.2 --- Human-to-model Measure --- p.63
Chapter 6.4.3 --- Parameters Optimization --- p.66
Chapter 6.5 --- Discussion --- p.69
Chapter 7 --- System Design and Implementation --- p.71
Chapter 7.1 --- Introduction --- p.71
Chapter 7.2 --- Hardware --- p.72
Chapter 7.3 --- Software --- p.78
Chapter 7.4 --- System Demonstration --- p.80
Chapter 8 --- Conclusion and Future Work --- p.82
Chapter 8.1 --- Contributions --- p.82
Chapter 8.2 --- Future Work --- p.84
Chapter A --- Hidden Markov Model Training --- p.87
Chapter A.1 --- Forward-backward Algorithm --- p.87
Chapter A.2 --- Baum-Welch Algorithm --- p.87
Chapter B --- Human Driving Behavior Data --- p.90
Chapter C --- Publications Resulted from the Study --- p.98
Gildemyn, Eric. "Caractérisation des procédés de fabrication de pièces de securité automobile. optimisation multiobjectifs de la mise en forme." Phd thesis, 2008. http://pastel.archives-ouvertes.fr/pastel-00004895.
Full text"A study of the market and the buying behavior of electronic autosecurity systems for private cars in Hong Kong." Chinese University of Hong Kong, 1993. http://library.cuhk.edu.hk/record=b5887557.
Full textThesis (M.B.A.)--Chinese University of Hong Kong, 1993.
Includes bibliographical references (leaf 120).
ACKNOWLEDGMENT --- p.i
ABSTRACT --- p.ii
TABLE OF CONTENTS --- p.iv
LIST OF TABLES --- p.vii
LIST OF FIGURES --- p.viii
Chapter
Chapter I. --- INTRODUCTION --- p.1
Objectives of the Research --- p.2
Chapter II. --- LITERATURE REVIEW --- p.4
Number of Private Cars in Hong Kong --- p.4
Problem of Vehicle Theft in Hong Kong --- p.5
Definition of Electronic Autosecurity Systems --- p.8
Market of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.9
Chapter III. --- METHODOLOGY --- p.10
Target Population --- p.10
Method of Data Collection --- p.10
Pretest --- p.11
Questionnaire --- p.11
Sampling --- p.12
Chapter IV. --- SURVEY FINDINGS --- p.14
Use of Autosecurity Systems --- p.14
Demographic Data About the Respondents --- p.15
Age --- p.15
Sex --- p.15
Education --- p.16
Driving Experience --- p.16
Data About the Car --- p.17
Data About Mechanical Autosecurity Devices Installed --- p.18
Degree of Satisfaction --- p.18
Data About Electronic Autosecurity Systems Installed --- p.19
Brand Awareness --- p.19
Country of Origin --- p.19
Time Spent on Information Search --- p.19
Cost --- p.20
Degree of Satisfaction --- p.20
Satisfactory and Dissatisfactory Aspects --- p.22
Information Sources --- p.24
Evaluative Criteria in the Purchase of Electronic Autosecurity Systems --- p.25
Decision Process --- p.26
Product Switching Behavior of Users of Mechanical Autosecurity Devices --- p.28
Chapter V. --- LIMITATIONS --- p.30
Chapter VI. --- CONCLUSION AND RECOMMENDATIONS --- p.34
Conclusion --- p.34
Information Sources --- p.35
Evaluative Criteria --- p.36
Decision Process --- p.37
Product Switching Behavior --- p.39
Recommendations --- p.41
Forecast of Market Potential of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.41
Market Share --- p.41
Market Potential --- p.42
Other Considerations --- p.43
Marketing Strategies --- p.43
Product Strategies --- p.43
Pricing Strategies --- p.45
Promotional Strategies --- p.46
Channel Strategies --- p.51
APPENDIX
Chapter A. --- PRETESTED QUESTIONNAIRE (ENGLISH & CHINESE) --- p.52
Chapter B. --- SUMMARY OF SURVEY FINDINGS --- p.63
EXHIBIT
Chapter I. --- NEWSPAPER ARTICLES ON CAR THEFTS IN HONG KONG --- p.104
Chapter II. --- PRODUCT CATALOGUES OF ELECTRONIC AUTOSECURITY SYSTEMS --- p.111
BIBLIOGRAPHY --- p.120