논문상세정보
' 자동차 공급망 위험관리(A-SCRM) 방안 연구' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • a-scrm
  • automotive supply chain risk management
  • ssca
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,300 0

0.0%

' 자동차 공급망 위험관리(A-SCRM) 방안 연구' 의 참고문헌

  • hankooki.com
  • US: Researchers hack BMW, OnStar, Ford SYNC and Hyundai telematics
  • Supply Chain Risk Management Practices for Federal Information Systems and Organizations(Second Draft)
    NIST [2014]
  • Specification of operating system
    AUTOSAR [2008]
  • Software Development Security: A Risk Management Perspective
    Rome, NY The DOD Software Tech News Secure Software Engineering 8 (2) [2005]
  • Software Assurance in Acquisition and Contract Language
    Software Assurance buildsecurityin.us-cert.gov, Acquisition & Outsourcing 1 [2012]
  • Security requirements for automotive on-board networks based on dark-side scenarios
    EVITA EVITA [2008]
  • Security and Privcy Vulnerabilities of In-Car Wireless Network : A Tire Pressure Monitoring System Case Study
    Ishtiaq Rouf USENIX Security : 1 ~ 16 [2010]
  • SBS News
  • Road vehicles Functional Safety
    ISO CD 26262 ISO [2011]
  • Police admit they're 'stumped' by mystery car thefts
  • On the Improvement and Application of the FMEA Process in ISO 26262
    Guan-tak Lim AJOU University [2013]
  • Main Requirements
    AUTOSAR [2008]
  • Implementation of the Integrated ESP and ACC in a CAN-Based Control System
    Young-Hun Ki KSAE : 2231 ~ 2236 [2007]
  • Hackers steal Subaru Outback with smartphone
  • Hacker Disables More Than 100 Cars Remotely
  • Functional safety of E/E/PE safety-related systems
    IEC 61508 IEC [1999]
  • Experimental Security Analysis of a Moderm Automobile
    Kari Koscher IEEE Symposium of Security and Privacy : 16 ~ 19 [2010]
  • Comprehensive Experimental Analyses of Automotive Attack Surfaces
    Stephen Checkoway USENIX Security : 1 ~ 16 [2011]
  • Car Securtiy Technology
    Won-jong Kim NIPA, Week Technology Trends 1601 : 10 ~ 20 [2013]
  • Automotive SPICE
  • Approaches for Vehicle Information Security
    IPA IPA [2013]
  • Approaches for Embedded System Information Security(2010 revised Edition)
    IPA IPA [2010]
  • Analysis of potential external threats vehicle ECU via CAN communications eavesdropping and manipulation
    Kang-suk Kim Korea University [2010]
  • A study on international standards and safety requirements for the development of automotive safety-related software
    Seonghyun Yun KSAE : 1884 ~ 1890 [2009]
  • A Method of System Requirements Specification Corresponding to ISO 26262 Functional Safety
    Younho Kim KSAE : 1548 ~ 1553 [2011]