1 |
e-나라지표, 지표조회상세, http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1257
|
2 |
교통사고분석시스템, 2018년 교통사고정보 교통사고 추세, http://taas.koroad.or.kr/sta/acs/gus/selectStaInfoGraph.do?menuId=WEB_KMP_IDA_TAI
|
3 |
한국도로교통공단, 공단보도자료 "급속한 고령사회의 먹구름이 도로 위를 덮치고 있다!," 2018.10.2., http://www.koroad.or.kr/kp_web/krPrView.do?board_code=GABBS_050&board_num=134227&file_num
|
4 |
Car Magazine, https://www.carmagazine.co.uk/car-news/tech/volvo-xc90-uber-driverless-car/
|
5 |
SAE J3016 Levels of Driving Automation, https://www.sae.org/news/2019/01/sae-updates-j3016-automated-driving-graphic
|
6 |
2019 AVT ACES Award Winner: Autonomy, https://www.autonomousvehicletech.com/articles/1311-audis-new-a8-reaches-conditional-level-3
|
7 |
H. Lengyel and Z. Szalay, "The Significance and Effect of the Traffic System Signaling to the Environment, Present and Future Traffic," International Congress of Automotive and Transport Engineering (AMMA 2018)
|
8 |
Waldemar Nawrocki, "Measurement systems and sensors," 2nd ed, Artech House, pp.377-409, 2016.
|
9 |
ETRI Webzine, "거스를 수 없는 대세, 자율주행자동차의 도래와 안전성," 2018(11).
|
10 |
J. Brunet and L. Rizzatti, "System-of-systems validation for automotive design," Tech Design Forum, 12/17/2019.
|
11 |
S. Ahmed, "ICT Integration for Electric Vehicles as Data Collector and Distributor of Data Services," International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 3, 2017.
|
12 |
Regulus, "Tesla model 3 spoofed off the highway-regulus navigation system hack causes car to turn on its own," https://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-researcheshacknavigation-system-causing-car-to-steer-off-road/
|
13 |
S. Chen, C. Cornelius, J. Martin, and D. H. P. Chau, "Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector," Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.52-68, 2018.
|
14 |
Y. Zhao, H. Zhu, R. Liang, Q. Shen, S. Zhang, and K. Chen, "Seeing isn't believing: Towards more robust adversarial attack against real world object detectors," ACM SIGSAC Conference on Computer and communications Security, pp.1989-2004, 2019.
|
15 |
N. Morgulis, A. Kreines, S. Mendelowitz, and Y. Weisglass, "Fooling a real car with adversarial traffic signs," arXiv:1907.00374, 2019.
|
16 |
J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, Vol.11, 2015.
|
17 |
keen labs, "Tencent keen security lab: Experimental security research of tesla autopilot," https://keenlab:tencent:com/en/2019/03/29/T encent-Keen-Security-Lab-Experimental-Secu rity-Research-of-Tesla-Autopilot/, 2019.
|
18 |
B. Nassi, D. Nassi, R. Ben-Netanel, Y. Mirsky, O. Drokin, and Y. Elovici, "Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems," https://eprint.iacr.org/2020/085.pdf, 2020.
|
19 |
S. Jeong and J. Lee, "Synthesis Algorithm for Effective Detection of GNSS Spoofing Attacks," International Journal of Aeronautical and Space Sciences, Vol.21, pp.251-264, 2020.
DOI
|
20 |
Netherlands Aerospace Centre, "GNSS Spoofing," NLR-CR-2019-001-PT-1-RecEd-1, Jun. 2019.
|
21 |
CAMP VSC3, https://www.campllc.org/vehicle-safety-communications-3-vsc3-consortium/
|
22 |
Z. Lu, G. Qu, and Z. Liu, "A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, Vol.20, No.2, pp.760-776, 2019.
DOI
|
23 |
J. Petit, F. Schaub, M. Feiri, and F. Kargl, "Pseudonym schemes in vehicular networks: A survey," IEEE Communications Surveys & Tutorials, Vol.17, No.1, pp.228-255, 2015.
DOI
|
24 |
IEEE 1609.2, https://standards.ieee.org/standard/1609_2-2016.html
|
25 |
자율주행산업발전 협의회, "V2X 보안인증체계 실증 사업을 위한 기술 규격," https://www.c-its.kr/board/getBoardDetail.do?seq=887
|
26 |
ITU 보안 국제표준 권고안, "V2X 통신 환경 보안 가이드라인(X.1372)," SG17 국제회의 선채택, Aug. 2019.
|
27 |
L. Yu, D. Zhang, X. Chen, and A. Hauptmann, "Traffic Danger Recognition With Surveillance Cameras Without Training Data," arXiv:1811.11969v1 [cs.CV] 29 Nov. 2018.
|
28 |
S. Grigorescu, B. Trasnea, T. Cocias, and G. Macesanu, "A Survey of Deep Learning Techniques for Autonomous Driving," arXiv:1910.07738v2 [cs.LG] 24 Mar. 2020
|
29 |
K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and D. Song, "Robust physical-world attacks on deep learning models," arXiv:1707.08945, 2017.
|
30 |
C. Sitawarin, A. N. Bhagoji, A. Mosenia, M. Chiang, and P. Mittal, "Darts: Deceiving autonomous cars with toxic signs," arXiv:1802.06430, 2018.
|
31 |
D. Song, K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, F. Tramer, A. Prakash, and T. Kohno, "Physical adversarial examples for object detectors," USENIX Workshop on Offensive Technologies (WOOT 18), 2018.
|
32 |
C. Yan, W. Xu, and J. Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self driving vehicle," DEF CON, Vol.24, 2016.
|
33 |
M. S. Sheikh and J. Liang, "A Comprehensive Survey on VANET Security Services in Traffic Management System," Wireless Communications and Mobile Computing, Vol.2019, Article ID 2423915, 2019.
|
34 |
R. Kaur and P. Singh, "Review of Black Hole and Grey Hole Attack," International Journal of Multimedia & Its Applications (IJMA), Vol.6, No.6, pp.35-45, 2014.
DOI
|
35 |
C. A. KERRACHE, C. T. CALAFATE, J. CANO, N. LAGRAA, and P. MANZONI, "Trust Management for Vehicular Networks: An Adversary-Oriented Overview," IEEE Access, Vol.4, pp.9293-9307, 2016.
DOI
|
36 |
N. Haddadou, A. Rachedi, and Y. Ghamri-Doudane, "Trust and exclusion in vehicular ad hoc networks: An economic incentive model based approach," Computing, Communications and IT Applications Conference (ComComAp), 2013.
|
37 |
J. Zhang, C. Chen, and R. Cohen, "Trust modeling for message relay control and local action decision making in VANETs," Security and Communication Networks, Vol.6, No.1, pp.1-14, 2013.
DOI
|
38 |
N. Yang, "A similarity based trust and reputation management framework for VANETs," International Journal of Future Generation Communication and Networking, Vol.6, No.2, pp.25-34, 2013.
DOI
|
39 |
S. A. Soleymani, A. H. Abdullah, W. Haslina, M. H. Anisi, S. Goudarzi, M. A. R. Baee1, and S. Mandala, "Trust management in vehicular ad hoc network: A systematic review," EURASIP Journal on Wireless Communications and Networking, Vol.2015, No.1, p.146, 2015.
DOI
|
40 |
S. Gurung, D. Lin, A. C. Squicciarini, and E. Bertino, "Information oriented trustworthiness evaluation in vehicular ad-hoc networks," International Conference on Network and System Security, pp.94-108, 2013.
|