Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services
Jin Kim, Jinho Yoo, Journal of Information Processing Systems Vol. 20, No. 2, pp. 173-184, Apr. 2024
Keywords: Connected car, Security, Threat modeling, vulnerability Analysis
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Kim, J. & Yoo, J. (2024). Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services. Journal of Information Processing Systems, 20(2), 173-184. DOI: 10.3745/JIPS.03.0195.
[IEEE Style]
J. Kim and J. Yoo, "Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services," Journal of Information Processing Systems, vol. 20, no. 2, pp. 173-184, 2024. DOI: 10.3745/JIPS.03.0195.
[ACM Style]
Jin Kim and Jinho Yoo. 2024. Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services. Journal of Information Processing Systems, 20, 2, (2024), 173-184. DOI: 10.3745/JIPS.03.0195.