Välkommen till Transportbibliotekets katalog

Normalvy MARC-vy

Modelling ITS Systems to Meet Security and Reliability Requirements Chan, Eric ; Robinson, Tom ; Preece, Andrew

Av: Medverkande: Utgivningsinformation: Bryssel ITS in daily life: 16th world congress and exhibition on intelligent transport systems and services, Stockholm 21-25 September 2009. Paper, 2009Beskrivning: 8 sÄmnen: Bibl.nr: VTI P1835:16 [World]Location: Abstrakt: Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.
Exemplartyp: Rapport, konferenser, monografier
Bestånd
Omslagsbild Exemplartyp Aktuellt bibliotek Hembibliotek Avdelning Hyllplacering Hyllsignatur Specificerade material Volyminfo URL Ex.nummer Status Kommentarer Förfallodatum Streckkod Exemplarreservationer Köplats för exemplarreservation Kurslistor
Statens väg- och transportforskningsinstitut Tillgänglig

Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.