최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국콘텐츠학회논문지 = The Journal of the Korea Contents Association, v.20 no.6, 2020년, pp.90 - 98
Modern vehicles are evolving from manual to automatic driving. As the ratio of electrical equipment and software increases inside the vehicle, vehicles that support autonomous driving are becoming another open computer system that can communicate with the outside. The safety of the vehicle means the...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
e-나라지표, 지표조회상세, http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd1257
교통사고분석시스템, 2018년 교통사고정보 교통사고 추세, http://taas.koroad.or.kr/sta/acs/gus/selectStaInfoGraph.do?menuIdWEB_KMP_IDA_TAI
한국도로교통공단, 공단보도자료 "급속한 고령사회의 먹구름이 도로 위를 덮치고 있다!," 2018.10.2., http://www.koroad.or.kr/kp_web/krPrView.do?board_codeGABBS_050&board_num134227&file_num
Car Magazine, https://www.carmagazine.co.uk/car-news/tech/volvo-xc90-uber-driverless-car/
SAE J3016 Levels of Driving Automation, https://www.sae.org/news/2019/01/sae-updates-j3016-automated-driving-graphic
2019 AVT ACES Award Winner: Autonomy, https://www.autonomousvehicletech.com/articles/1311-audis-new-a8-reaches-conditional-level-3
H. Lengyel and Z. Szalay, "The Significance and Effect of the Traffic System Signaling to the Environment, Present and Future Traffic," International Congress of Automotive and Transport Engineering (AMMA 2018)
Waldemar Nawrocki, "Measurement systems and sensors," 2nd ed, Artech House, pp.377-409, 2016.
ETRI Webzine, "거스를 수 없는 대세, 자율주행자동차의 도래와 안전성," 2018(11).
J. Brunet and L. Rizzatti, "System-of-systems validation for automotive design," Tech Design Forum, 12/17/2019.
S. Ahmed, "ICT Integration for Electric Vehicles as Data Collector and Distributor of Data Services," International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 3, 2017.
M. S. Sheikh and J. Liang, "A Comprehensive Survey on VANET Security Services in Traffic Management System," Wireless Communications and Mobile Computing, Vol.2019, Article ID 2423915, 2019.
R. Kaur and P. Singh, "Review of Black Hole and Grey Hole Attack," International Journal of Multimedia & Its Applications (IJMA), Vol.6, No.6, pp.35-45, 2014.
C. A. KERRACHE, C. T. CALAFATE, J. CANO, N. LAGRAA, and P. MANZONI, "Trust Management for Vehicular Networks: An Adversary-Oriented Overview," IEEE Access, Vol.4, pp.9293-9307, 2016.
C. Yan, W. Xu, and J. Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self driving vehicle," DEF CON, Vol.24, 2016.
N. Haddadou, A. Rachedi, and Y. Ghamri-Doudane, "Trust and exclusion in vehicular ad hoc networks: An economic incentive model based approach," Computing, Communications and IT Applications Conference (ComComAp), 2013.
N. Yang, "A similarity based trust and reputation management framework for VANETs," International Journal of Future Generation Communication and Networking, Vol.6, No.2, pp.25-34, 2013.
S. A. Soleymani, A. H. Abdullah, W. Haslina, M. H. Anisi, S. Goudarzi, M. A. R. Baee1, and S. Mandala, "Trust management in vehicular ad hoc network: A systematic review," EURASIP Journal on Wireless Communications and Networking, Vol.2015, No.1, p.146, 2015.
S. Gurung, D. Lin, A. C. Squicciarini, and E. Bertino, "Information oriented trustworthiness evaluation in vehicular ad-hoc networks," International Conference on Network and System Security, pp.94-108, 2013.
J. Zhang, C. Chen, and R. Cohen, "Trust modeling for message relay control and local action decision making in VANETs," Security and Communication Networks, Vol.6, No.1, pp.1-14, 2013.
Z. Lu, G. Qu, and Z. Liu, "A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, Vol.20, No.2, pp.760-776, 2019.
J. Petit, F. Schaub, M. Feiri, and F. Kargl, "Pseudonym schemes in vehicular networks: A survey," IEEE Communications Surveys & Tutorials, Vol.17, No.1, pp.228-255, 2015.
IEEE 1609.2, https://standards.ieee.org/standard/1609_2-2016.html
CAMP VSC3, https://www.campllc.org/vehicle-safety-communications-3-vsc3-consortium/
자율주행산업발전 협의회, "V2X 보안인증체계 실증 사업을 위한 기술 규격," https://www.c-its.kr/board/getBoardDetail.do?seq887
ITU 보안 국제표준 권고안, "V2X 통신 환경 보안 가이드라인(X.1372)," SG17 국제회의 선채택, Aug. 2019.
L. Yu, D. Zhang, X. Chen, and A. Hauptmann, "Traffic Danger Recognition With Surveillance Cameras Without Training Data," arXiv:1811.11969v1 [cs.CV] 29 Nov. 2018.
S. Grigorescu, B. Trasnea, T. Cocias, and G. Macesanu, "A Survey of Deep Learning Techniques for Autonomous Driving," arXiv:1910.07738v2 [cs.LG] 24 Mar. 2020
K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and D. Song, "Robust physical-world attacks on deep learning models," arXiv:1707.08945, 2017.
C. Sitawarin, A. N. Bhagoji, A. Mosenia, M. Chiang, and P. Mittal, "Darts: Deceiving autonomous cars with toxic signs," arXiv:1802.06430, 2018.
D. Song, K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, F. Tramer, A. Prakash, and T. Kohno, "Physical adversarial examples for object detectors," USENIX Workshop on Offensive Technologies (WOOT 18), 2018.
S. Chen, C. Cornelius, J. Martin, and D. H. P. Chau, "Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector," Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.52-68, 2018.
Y. Zhao, H. Zhu, R. Liang, Q. Shen, S. Zhang, and K. Chen, "Seeing isn't believing: Towards more robust adversarial attack against real world object detectors," ACM SIGSAC Conference on Computer and communications Security, pp.1989-2004, 2019.
N. Morgulis, A. Kreines, S. Mendelowitz, and Y. Weisglass, "Fooling a real car with adversarial traffic signs," arXiv:1907.00374, 2019.
J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, Vol.11, 2015.
keen labs, "Tencent keen security lab: Experimental security research of tesla autopilot," https://keenlab:tencent:com/en/2019/03/29/T encent-Keen-Security-Lab-Experimental-Secu rity-Research-of-Tesla-Autopilot/, 2019.
Regulus, "Tesla model 3 spoofed off the highway-regulus navigation system hack causes car to turn on its own," https://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-researcheshacknavigation-system-causing-car-to-steer-off-road/
B. Nassi, D. Nassi, R. Ben-Netanel, Y. Mirsky, O. Drokin, and Y. Elovici, "Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems," https://eprint.iacr.org/2020/085.pdf, 2020.
S. Jeong and J. Lee, "Synthesis Algorithm for Effective Detection of GNSS Spoofing Attacks," International Journal of Aeronautical and Space Sciences, Vol.21, pp.251-264, 2020.
Netherlands Aerospace Centre, "GNSS Spoofing," NLR-CR-2019-001-PT-1-RecEd-1, Jun. 2019.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.