ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
48
views
0
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,731
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Securing vehicles against cyber attacks
proceedings-article
Author(s):
Ulf E. Larson
,
Dennis K. Nilsson
Publication date
(Print):
2008
Conference name:
the 4th annual workshop (CSIIRW '08)
Conference theme:
developing strategies to meet the cyber security and information intelligence challenges ahead
Conference date:
June 12, 2008 - June 14, 2008
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and article information
Conference
Publication date (Print):
2008
Page
: 1
Article
DOI:
10.1145/1413140.1413174
SO-VID:
f7c17db1-c486-4bb2-9d21-739320b2c74c
Copyright ©
© 2008
Conference name:
the 4th annual workshop
Conference acronym:
CSIIRW '08
Conference number:
4
Conference location:
Oak Ridge, Tennessee
Conference date:
June 12, 2008 - June 14, 2008
Conference theme:
developing strategies to meet the cyber security and information intelligence challenges ahead
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,731
Public–private partnerships on cyber security: a practice of loyalty
Authors:
Kristoffer Kjærgaard Christensen
,
Karen Lund Petersen
In-hospital stroke recurrence and stroke after transient ischemic attack: frequency and risk factors.
Authors:
Hebun Erdur
,
Jan F Scheitz
,
Martin Ebinger
…
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Authors:
Ethan Rudd
,
Andras Rozsa
,
Manuel Günther
…
See all similar
Cited by
8
Cyber-Physical Systems Security—A Survey
Authors:
Jingqiang Lin
,
Fengjun Li
,
Bo Luo
…
A study on cyber-security of autonomous and unmanned vehicles
Authors:
Cemal Gemci
,
A Aktaş
,
Eray Yağdereli
A Flexible Design Flow for Software IP Binding in FPGA
Authors:
Patrick Schaumont
,
Abhranil Maiti
,
Michael Gora
See all cited by