Your Selections

Cybersecurity
Show Only

Collections

File Formats

Content Types

Dates

Sectors

Topics

Authors

Publishers

Affiliations

Committees

Events

Magazine

Series

SAE International Journal of Transportation Cybersecurity and Privacy

  • Journal
  • V129-11EJ
To be published on 2020-06-30 by SAE International in United States
This is the electronic format of the journal.
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.
new

Data Security Services

Motor Vehicle Council
  • Ground Vehicle Standard
  • J1760_201910
  • Current
Published 2019-10-09 by SAE International in United States
The scope of this SAE Recommended Practice is to require the use of the same Security Services as defined by the International Standard ISO/CD 15764, modified by the Class of Security as determined by the resource provider and referenced in Table 1, Extended Data Link Security References.
This content contains downloadable datasets
Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Defeating Commercial Drone Threats with Open-Source SDR

Aerospace & Defense Technology: October 2019

  • Magazine Article
  • 19AERP10_06
Published 2019-10-01 by SAE International in United States

With the emergence of highly capable, low-cost, wirelessly controlled drones, bad actors can easily execute disruptive operations. Such incidents have created a need for drone defense systems that rapidly evolve with ever-increasing threat frequency and sophistication.

It's nearly impossible to look at technology news without seeing an article about drones. Whether detailing how Amazon wants to use drones to deliver packages or revealing amazing aerial video of drones following Olympic snowboarders, commercial drones are ubiquitous. Drone emergence has benefited many applications including sports broadcasting and wildlife preservation wilderness surveys. Offering powerful, intelligent software, drones are becoming less expensive and easier to use, with substantial operating range.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Supply Chain Vulnerabilities Impacting Commercial Aviation

Kirsten M. Koepsel
  • Book
  • T-138
Published 2019-09-04 by SAE International in United States

Written by Kirsten Koepsel, a lawyer and engineer whose work has focused on aviation cybersecurity, Supply Chain Vulnerabilities Impacting Commercial Aviation addresses the big question facing aircraft manufacturers today: keep the work in house or outsource it? The ongoing battle between cost cutting and supply-chain control is ever more visible as aircraft OEMs have full order books and tight delivery schedules.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

BlackBerry Tech Duo Sees Emergence of Vehicle-based Platforms

Autonomous Vehicle Engineering: September 2019

Paul Seredynski
  • Magazine Article
  • 19AVEP09_07
Published 2019-09-01 by SAE International in United States

Though likely to provide the OS of autonomy, BlackBerry also anticipates a larger shift to automobiles as software platforms.

At 2019's TU Automotive conference, Autonomous Vehicle Engineering spoke with two of the industry's most important software sages, BlackBerry's John Wall and Kaivan Karimi, both senior vice presidents and co-heads of Blackberry Technology Solutions. The duo's division includes BlackBerry's security services, the nigh ubiquitous QNX architecture along with products including Jarvis, Certicom and Paratek for the Waterloo, Ontario-based company. Sort of like chatting with the Obi-Wan and Yoda of secure-software architectures, the interview provided an animated back-and-forth between the two well-acquainted BlackBerry execs, discussing the emergence of the vehicle as its own software platform.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Autonomy in Your Face

Autonomous Vehicle Engineering: September 2019

Terry Costlow
  • Magazine Article
  • 19AVEP09_04
Published 2019-09-01 by SAE International in United States

Biometric technology is deemed essential to ensuring AV driving safety and advancing the user experience-if privacy issues don't derail its deployment.

Research into potential automotive applications for biometrics-facial and retina scans or fingerprints-is increasing, despite rising concerns about privacy and data security, and outcries from civil liberties advocates. A growing number of OEMs, Tier 1s and startups are striving to add facial recognition capability to driver monitoring systems (DMS).

Annotation ability available

Facility Focus: Georgia Tech Research Institute

  • Magazine Article
  • TBMG-35142
Published 2019-09-01 by Tech Briefs Media Group in United States

The Georgia Tech Research Institute (GTRI) is the nonprofit applied research division of the Georgia Institute of Technology (Georgia Tech) in Atlanta, GA. Founded in 1934 as the Engineering Experiment Station, GTRI supports eight laboratories in more than 20 locations around the country and performs more than $370 million of research annually for government and industry.

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Editorial

Autonomous Vehicle Engineering: September 2019

Editorial Director-Bill Visnic
  • Magazine Article
  • 19AVEP09_01
Published 2019-09-01 by SAE International in United States

Although editor-in-chief Lindsay Brooke's cover story detailing the foundations of Israel's surging tech sector helps to explain the nation's expanding expertise in all things cyber-secure, much of this issue deals with security and privacy of another kind-the access we grant almost daily to all manner of digital “providers” of goods and services.

Annotation ability available

Technology Produces Unclonable Digital Fingerprints for Internet of Things Devices

  • Magazine Article
  • TBMG-34932
Published 2019-08-01 by Tech Briefs Media Group in United States

Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to authenticate devices linked to the Internet of Things (IoT).

Hands-on Cybersecurity Studies: Multi-Perspective Analysis of the WannaCry Ransomware

  • Magazine Article
  • TBMG-34864
Published 2019-08-01 by Tech Briefs Media Group in United States

Ransomware is malware that obstructs a user from accessing digital assets through various mechanisms. These assets are held hostage and inaccessible until the user pays a ransom. In most cases, this is accomplished using encryption where, once the malicious program executes, it will target and encrypt certain files and will release the decryption key at the time of payment. Some ransomware instances target only certain common user-generated files such as media and documents. In this case, system files and others required for the operating system to function correctly (user authentication, process execution, etc.) are unaffected. Others encrypt much more and seek to lock out entire systems.