LEADER 02375nam 2200505 450 001 9910438220303321 005 20221206104321.0 010 $a0-7680-8485-7 010 $a0-7680-8377-X 024 7 $a10.4271/jp-about-002 035 $a(CKB)4340000000263788 035 $a(MiAaPQ)EBC5341836 035 $a(CaBNVSL)mat08503658 035 $a(IDAMS)0b00006488763736 035 $a(IEEE)8503658 035 $a(EXLCZ)994340000000263788 100 $a20181229d2016 uy 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAutomotive cybersecurity $efrom perceived threat to stark reality /$fShamik Ghosh 210 1$aWarrendale, Pa. (400 Commonwealth Dr., Wallendale PA USA) :$cSociety of Automotive Engineers,$d[2016] 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2016] 215 $a1 online resource (vi, 44 pages) $cillustrations 225 1 $aSociety of Automotive Engineers. Electronic publications. 311 $a0-7680-9480-1 320 $aIncludes bibliographical references. 327 $a1. The automotive cybersecurity conundrum -- 2. Nuts and bolts of cyberattacks -- 3. Remote attack surfaces in modern vehicles -- 4. Perspective: the vehicle manufacturers' take on cybersecurity -- 5. Regulatory landscape for automotive cybersecurity -- 6. Securing our connected vehicles -- 7. Automotive cybersecurity projects and solutions -- References. 330 $aThis review analyzes automotive cybersecurity threats that are gaining attention worldwide and the apparent ways industries are responding to them. It also addresses the need to continue investment in cyber research and security, as well as the 'security by design' approach that automakers are likely to adopt as a long-term strategy to fend off cyber-attacks. 410 0$aSociety of Automotive Engineers. Electronic publications. 606 $aAutomotive computers 606 $aAutomotive computers$xSecurity measures 615 0$aAutomotive computers. 615 0$aAutomotive computers$xSecurity measures. 676 $a629.27 700 $aGhosh$b Shamik$01252048 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910438220303321 996 $aAutomotive cybersecurity$92902658 997 $aUNINA