(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NKB5KB'); Reliably Detecting and Defending Attacks - Requirements for Automotive Intrusion Detection Systems | Vector

Reliably Detecting and Defending Attacks - Requirements for Automotive Intrusion Detection Systems

Many new customer functions in vehicles are based on extensive connectivity of onboard and offboard services. This also poses the challenge of protecting the vehicle against cybersecurity attacks. Along with established security mechanisms, industry experts are now discussing the use of Intrusion Detection Systems (IDS) intensively. But there are special challenges for their use in the automotive environment.

Read the Article