Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services
Jin Kim, Jinho Yoo, Journal of Information Processing Systems Vol. 20, No. 2, pp. 173-184, Apr. 2024
https://doi.org/10.3745/JIPS.03.0195
Keywords: Connected car, Security, Threat modeling, vulnerability Analysis
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Kim, J. & Yoo, J. (2024). Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services. Journal of Information Processing Systems, 20(2), 173-184. DOI: 10.3745/JIPS.03.0195.
[IEEE Style]
J. Kim and J. Yoo, "Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services," Journal of Information Processing Systems, vol. 20, no. 2, pp. 173-184, 2024. DOI: 10.3745/JIPS.03.0195.
[ACM Style]
Jin Kim and Jinho Yoo. 2024. Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services. Journal of Information Processing Systems, 20, 2, (2024), 173-184. DOI: 10.3745/JIPS.03.0195.