LEADER 03771nam 2200433 450 001 9910418325403321 005 20210224090511.0 010 $a981-15-8053-7 024 7 $a10.1007/978-981-15-8053-6 035 $a(CKB)4100000011469447 035 $a(MiAaPQ)EBC6357276 035 $a(DE-He213)978-981-15-8053-6 035 $a(PPN)250219697 035 $a(EXLCZ)994100000011469447 100 $a20210224d2020 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAutomotive cyber security $eintroduction, challenges, and standardization /$fShiho Kim, Rakesh Shrestha 205 $a1st ed. 2020. 210 1$aCham, Switzerland :$cSpringer,$d[2020] 210 4$dİ2020 215 $a1 online resource (XVII, 216 p. 78 illus., 76 illus. in color.) 311 $a981-15-8052-9 330 $aThis book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles? intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view. 606 $aAutomated vehicles$xComputer networks$xSecurity measures 615 0$aAutomated vehicles$xComputer networks$xSecurity measures. 676 $a303.4832 700 $aKim$b Shiho$0894835 702 $aShrestha$b Rakesh 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910418325403321 996 $aAutomotive cyber security$91999213 997 $aUNINA LEADER 04044nam 2200565 450 001 9910812607803321 005 20230803020243.0 010 $a0-87609-545-7 010 $a0-87609-546-5 010 $a1-299-14781-X 035 $a(CKB)2550000001000873 035 $a(EBL)3425945 035 $a(SSID)ssj0001235763 035 $a(PQKBManifestationID)12468779 035 $a(PQKBTitleCode)TC0001235763 035 $a(PQKBWorkID)11237532 035 $a(PQKB)10447424 035 $a(MiAaPQ)EBC3425945 035 $a(EXLCZ)992550000001000873 100 $a20150725h20132013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aReforming U.S. drone strike policies /$fMicah Zenko 210 1$aNew York, New York :$cCouncil on Foreign Relations,$d2013. 210 4$dİ2013 215 $a1 online resource (52 p.) 225 1 $aCouncil Special Report ;$vNumber 65 300 $aDescription based upon print version of record. 311 $a0-87609-544-9 327 $aContents; Foreword; Acknowledgments; Introduction; How Drones Are Different; Issues in U.S. Drone Strike Policies; Drone Strikes by Other States or Nonstate Actors; Recommendations; Endnotes; About the Author; Advisory Committee for Reforming U.S. Drone Strike Policies; CPA Advisory Committee; Mission Statement of the Center for Preventive Action; Council Special Reports 330 $a"Over the last ten years, drones have become a critical tool in the war against terrorist and militant organizations worldwide. Their advantages over other weapons and intelligence systems are well known. They can silently observe an individual, group, or location for hours on end, but take immediate action should a strike opportunity become available-- all without putting a pilot at risk. This combination of capabilities is unique and has allowed the United States to decimate the leadership of al-Qaeda in Afghanistan and disrupt the activities of many other militant groups. Yet, as Micah Zenko writes in this Council Special Report, drones are not without their drawbacks, especially with regard to targeted killings. Like any tool, drones are only as useful as the information guiding them, and for this they are heavily reliant on local military and intelligence cooperation. More important, significant questions exist about who constitutes a legitimate target and under what circumstances it is acceptable to strike. There is also the question of net utility: To what extent are the specific benefits derived from drone strikes offset by the reality that the strikes often alienate the local government and population? And there is the reality that drones are proliferating but, as is often the case with new technologies, the international legal and regulatory framework is lagging behind. Zenko puts forward a substantive agenda. He argues that the United States should end so-called signature strikes, which target unidentified militants based on their behavior patterns and personal networks, and limit targeted killings to a limited number of specific terrorists with transnational ambitions. He also calls Congress to improve its oversight of drone strikes and to continue restrictions on armed drone sales. Finally, he recommends that the United States work internationally to establish rules and norms governing the use of drones."--Foreword. 410 0$aCSR (New York, N.Y.) ;$vNumber 65. 606 $aDrone aircraft$xGovernment policy$zUnited States 606 $aTargeted killing$xGovernment policy$zUnited States 615 0$aDrone aircraft$xGovernment policy 615 0$aTargeted killing$xGovernment policy 676 $a358.4/283 700 $aZenko$b Micah$01620572 712 02$aCouncil on Foreign Relations, 712 02$aCenter for Preventive Action, 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910812607803321 996 $aReforming U.S. drone strike policies$93953419 997 $aUNINA