B. , Object Classification Failure : We identified four scenarios related to the use case of object classification failure

, A CAV uses a revolving light to gain road priority ? Camera classifies obstacle as special vehicle ? V2X message classifies obstacle as

, Misbehaving CAV claims fake rights

, ? V2X message from ITS-V classifies it as "special vehicle" ? Camera classifies ITS-V as

, Altered Roadsign (90km/h limitation) is altered into a 10 km/h roadsign ? Camera classifies obstacle as "10km/h roadsign

?. V2x, roadmap classifies obstacle as "90 km/h roadsign

, CAV is undetected by a sensor due to several cause of failures. We identified 5 categories of failures scenario. 1. destruction/alteration/removal of: ? the sensor hardware ? the sensor data (software, measurements

, ? the C-ITS station or its components (traffic light, brake light

, ? The CAV and the ego vehicle are sensor jammed

, ? road topologies (hill, hairpin turns

, ? road obstacles (buildings and vehicles

, ? harsh weather conditions (blizzard, sand storm, mist or tropical rain)

J. Monteuuis, My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension, 3 rd International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE, pp.1-8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02348444

J. Monteuuis, Attacker model for Connected and Automated Vehicles". In: 2nd Computer Science in Cars Symposium -Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles, ACM. Munich, Germany, pp.3-14, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02348436

J. Monteuuis, SARA: Security Automotive Risk Analysis Method, Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp.3-14, 2018.

J. Monteuuis, Sensor-V2X Correlation for Misbehavior Detection". to be submitted to a journal, 2019.

J. Monteuuis, Détection erroné d'un faux à l'aide du système V2X, Patent 2019P01099 FR (FR)

J. Monteuuis, Intégration des dimensions d'un véhicule dans un certificat d'authentification, Patent 2019P01024 FR (FR)

J. Monteuuis, Procédé d'aide à la conduite fiable pour l'embarquement et débarquement d'un véhicule cargo communicant sécurisé, Patent 2019P00380 FR (FR)

J. Monteuuis, Procédé d'aide à la conduite pour vérifier l'intégrité d'un panneau de signalisation perçu par caméra, Patent 2018P02037 FR (FR)

J. Monteuuis, Procédé d'aide à la conduite sur un aéroport/port à l'aide d'une infrastructure communicante, Patent 2019P00381 FR (FR)

J. Monteuuis, Procédé de détection de défaillances et limitations des capteurs à l'aide des communications Car2X

J. Monteuuis, Procédé de détection de la plausibilité des données V2X basé sur l'agrégation des techniques de mesures du signal radio, Patent 2019P00379 FR (FR)

J. Monteuuis, Procédé et système pour traiter un message transmis à un véhicule automobile par une entité communicante distante, Patent 2019P00531 FR (FR)

J. Monteuuis, Procédé sécurisé d'aide à une conduite fiable et sûre pour le franchissement d'un passage à niveau communicant, Patent 2018P00608 FR (FR)

J. Monteuuis, Procédédé de gestion d'un message transmis par une station émettrice d'un système de transport intelligent, Patent 2018P01119 FR (FR)

. Award,

J. Monteuuis, Resilience by design & failures forecasting for a connected autonomous vehicle. 2nd Prize, My Thesis in 3 minutes, European CyberWeek, 2018.
URL : https://hal.archives-ouvertes.fr/tel-02513392

J. William and . Youden, Index for rating diagnostic tests, Cancer 3.1 (1950), pp.32-35

J. Cohen, A Coefficient of Agreement for Nominal Scales, In: Educational and Psychological Measurement, vol.20, p.37, 1960.

W. Brian and . Matthews, Comparison of the predicted and observed secondary structure of T4 phage lysozyme, Biochimica et Biophysica Acta (BBA)-Protein Structure 405, vol.2, pp.442-451, 1975.

M. Fellendorf, VISSIM: A microscopic simulation tool to evaluate actuated signal control including bus priority, 64th Institute of Transportation Engineers Annual Meeting, vol.32, pp.1-9, 1994.

S. Krauß, Microscopic modeling of traffic flow: Investigation of collision free vehicle dynamics, 1998.

X. Zeng, R. Bagrodia, and M. Gerla, GloMoSim: a library for parallel simulation of large-scale wireless networks, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS'98 (Cat. No. 98TB100233), pp.154-161, 1998.

S. Blackman and R. Popoli, Design and analysis of modern tracking systems(Book), 1999.

K. Hormann and A. Agathos, The point in polygon problem for arbitrary polygons, Comput. Geom. Theory Appl, vol.20, issue.01, pp.12-20, 2001.

M. Howard and D. Leblanc, The STRIDE Threat Model. From the Book Writing Secure Code, 2002.

D. Leblanc and M. Howard, Writing secure code. Pearson Education, 2002.

D. Firesmith, Specifying reusable security requirements, In: Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004.

P. Golle, D. Greene, and J. Staddon, Detecting and correcting malicious data in VANETs, Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp.29-37, 2004.

N. Kaempchen, Sensor fusion for multiple automotive active safety and comfort applications, Advanced Microsystems for Automotive Applications, pp.137-163, 2004.

H. Takizawa, K. Yamada, and T. Ito, Vehicles detection using sensor fusion, IEEE Intelligent Vehicles Symposium, pp.238-243, 2004.

M. Darms and H. Winner, A modular system architecture for sensor data processing of ADAS applications, IEEE Proceedings. Intelligent Vehicles Symposium, pp.729-734, 2005.

N. Kaempchen, M. Buehler, and K. Dietmayer, Featurelevel fusion for free-form object tracking using laserscanner and video, IEEE Proceedings. Intelligent Vehicles Symposium, pp.453-458, 2005.

K. Naab and A. Frey, Efficient in-vehicle sensor and signal processing architectures for driver assistance and active safety systems, 12th World Congress on Intelligent Transport SystemsITS AmericaITS JapanERTICO, 2005.

D. Gruyer, SiVIC and RTMaps, interconnected platforms for the conception and the evaluation of driving assistance systems, Proceedings of the its world congress, vol.10, 2006.

S. Hernan, Threat modeling-uncover security design flaws using the stride approach, pp.68-75, 2006.

M. Mahlisch, Sensorfusion using spatio-temporal aligned video and lidar for improved vehicle detection, 2006 IEEE Intelligent Vehicles Symposium, pp.424-429, 2006.

N. Floudas, High level sensor data fusion approaches for object recognition in road environment, 2007 IEEE Intelligent Vehicles Symposium, pp.136-141, 2007.

M. Raya and J. Hubaux, Securing vehicular ad hoc networks, Journal of computer security, vol.15, pp.39-68, 2007.

M. Raya, Eviction of misbehaving and faulty nodes in vehicular networks, IEEE Journal on Selected Areas in Communications, vol.25, pp.1557-1568, 2007.

G. Yan, S. Olariu, and M. C. Weigle, Providing VANET security through active position detection, Computer communications, vol.31, pp.2883-2897, 2008.

O. Henniger, Security requirements for automotive on-board networks, Intelligent Transport Systems Telecommunications, pp.641-646, 2009.
URL : https://hal.archives-ouvertes.fr/hal-02286288

S. Pietzsch, Results of a precrash application based on laser scanner and short-range radars, IEEE Transactions on Intelligent Transportation Systems, vol.10, pp.584-593, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01023064

W. Mckinney, Data Structures for Statistical Computing in Python, Proceedings of the 9th Python in Science Conference, pp.51-56, 2010.

F. George, T. Riley, and . Henderson, The ns-3 network simulator". In: Modeling and tools for network simulation, pp.15-34, 2010.

D. Tian, A vehicular ad hoc networks intrusion detection system based on BUSNet, 2010 2nd International Conference on Future Computer and Communication, vol.1, pp.1-225, 2010.

A. Varga, OMNeT++". In: Modeling and tools for network simulation, pp.35-59, 2010.

B. Wiedersheim, Privacy in inter-vehicular networks: Why simple pseudonym change is not enough, Wireless On-demand Network Systems and Services (WONS), pp.176-183, 2010.

. Ts-etsi, Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN)". In: Methods and protocols, vol.102, pp.2011-2014, 2011.

D. Göhring, Radar/lidar sensor fusion for car-following on highways, The 5th International Conference on Automation, Robotics and Applications, pp.407-412, 2011.

J. Grover, V. Laxmi, and M. Singh-gaur, Misbehavior detection based on ensemble learning in vanet, International Conference on Advanced Computing, Networking and Security, pp.602-611, 2011.

J. Grover, Machine learning approach for multiple misbehavior detection in VANET, International Conference on Advances in Computing and Communications, pp.644-653, 2011.

F. Pedregosa, Scikit-learn: Machine learning in Python, Journal of machine learning research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

C. Sommer, R. German, and F. Dressler, Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis, IEEE Transactions on Mobile Computing, vol.10, issue.1, pp.1536-1233, 2011.

M. Wolf and T. Gendrullis, Design, implementation, and evaluation of a vehicular hardware security module, International Conference on Information Security and Cryptology, pp.302-318, 2011.

N. Bismeyer, Assessment of node trustworthiness in vanets using data plausibility checks with particle filters, Vehicular Networking Conference (VNC), pp.78-85, 2012.

A. Jaeger, A novel framework for efficient mobility data verification in vehicular ad-hoc networks, International Journal of Intelligent Transportation Systems Research, vol.10, issue.1, pp.11-21, 2012.

R. Moalla, Risk analysis study of its communication architecture, Network of the Future (NOF), 2012 Third International Conference on the, pp.1-5, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00814320

M. Wolf and M. Scheibel, A Systematic Approach to a Qualified Security Risk Analysis for Vehicular IT Systems, Automotive-Safety & Security. 2012, pp.195-210

S. Behere, M. Törngren, and D. Chen, A reference architecture for cooperative driving, In: journal of Systems Architecture, vol.59, pp.1095-1112, 2013.

A. Daeinabi and A. Ghaffarpour-rahbar, Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks, Multimedia tools and applications, vol.66, pp.325-338, 2013.

N. Developers, NumPy". In: NumPy Numpy. Scipy Developers, 2013.

N. Dutta and S. Chellappan, A time-series clustering approach for Sybil attack detection in vehicular ad hoc networks, Int. Conf. Adv. Veh. Syst., Technol. Appl, pp.21-26, 2013.

S. Lefevre, Impact of v2x privacy strategies on intersection collision avoidance systems, 2013 IEEE Vehicular Networking Conference, pp.71-78, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00905936

M. Rondinone, iTETRIS: a modular simulation platform for the large scale evaluation of cooperative ITS applications, Simulation Modelling Practice and Theory, vol.34, pp.99-125, 2013.

W. Whyte, A security credential management system for V2V communications, Vehicular Networking Conference (VNC), 2013.

. Ieee and . Ieee, , pp.1-8, 2013.

A. Brisbourne, Teslas over-the-air fix: Best example yet of the internet of things?, In: Wired Magazine February, 2014.

. En-etsi, , vol.302, pp.637-639, 2014.

B. Ghena, Green Lights Forever: Analyzing the Security of Traffic Infrastructure, In: WOOT, vol.14, pp.7-7, 2014.

N. Kumar and N. Chilamkurti, Collaborative trust aware intelligent intrusion detection in VANETs, Computers & Electrical Engineering, vol.40, pp.1981-1996, 2014.

C. Miller and C. Valasek, A survey of remote automotive attack surfaces, p.94, 2014.

M. Obst, L. Hobert, and P. Reisdorf, Multi-sensor data fusion for checking plausibility of V2V communications by vision-based multiple-object tracking, Vehicular Networking Conference (VNC), pp.143-150, 2014.

J. Petit, M. Feiri, and F. Kargl, Revisiting attacker model for smart vehicles, IEEE 6th International Symposium on. IEEE, pp.1-5, 2014.

H. Sedjelmaci and S. Senouci, A new intrusion detection framework for vehicular networks, 2014 IEEE International Conference on Communications (ICC), pp.538-543, 2014.

A. Tomandl, VANETsim: An open source simulator for security and privacy concepts in VANETs, pp.543-550, 2014.

A. Khattab-m-ali-alheeti, K. D. Gruebler, and . Mcdonald-maier, An intrusion detection system against black hole attacks on the communication network of self-driving cars, 2015 sixth international conference on emerging security technologies (EST), pp.86-91, 2015.

A. Khattab-m-ali-alheeti, K. D. Gruebler, and . Mcdonald-maier, An intrusion detection system against malicious attacks on the communication network of driverless cars, 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp.916-921, 2015.

A. Khattab-m-ali-alheeti, K. D. Gruebler, and . Mcdonald-maier, On the detection of grey hole and rushing attacks in self-driving vehicular networks, 7th Computer Science and Electronic Engineering Conference (CEEC), pp.231-236, 2015.

A. Boudguiga, RACE: Risk analysis for cooperative engines, New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on, pp.1-5, 2015.

K. Emara, W. Woerndl, and J. Schlichter, On evaluation of location privacy preserving schemes for VANET safety applications, Computer Communications, vol.63, pp.11-23, 2015.

W. Li, A. Joshi, and T. Finin, Svm-case: An svm-based context aware security framework for vehicular ad-hoc networks, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), pp.1-5, 2015.

G. Macher, SAHARA: a security-aware hazard and risk analysis method, Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.621-624, 2015.

A. Leandros and . Maglaras, A novel distributed intrusion detection system for vehicular ad hoc networks, International Journal of Advanced Computer Science and Applications (IJACSA), vol.6, pp.101-106, 2015.

J. Petit, E. Steven, and . Shladover, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent Transportation Systems, vol.16, pp.546-556, 2015.

J. Petit, Connected vehicles: Surveillance threat and mitigation, Black Hat Europe, vol.11, p.2015, 2015.

J. Petit, Pseudonym schemes in vehicular networks: A survey, IEEE communications surveys & tutorials, vol.17, pp.228-255, 2015.

J. Petit, Remote attacks on automated vehicles sensors: Experiments on camera and lidar, Black Hat Europe, vol.11, p.2015, 2015.

H. Sedjelmaci and S. Senouci, An accurate and efficient collaborative intrusion detection framework to secure vehicular networks, Computers & Electrical Engineering, vol.43, pp.33-47, 2015.

Y. Mohammad and . Abualhoul, Study and evaluation of laser-based perception and light communication for a platoon of autonomous vehicles, Intelligent Transportation Systems (ITSC), 2016 IEEE 19th International Conference on, pp.1798-1804, 2016.

A. Khattab, K. Alheeti, and . Mcdonald-maier, An intelligent intrusion detection scheme for self-driving vehicles based on magnetometer sensors, 2016 International Conference for Students on Applied Engineering (ICSAE), pp.75-78, 2016.

A. Khattab-ali-alheeti, K. Gruebler, and . Mcdonald-maier, Intelligent intrusion detection of grey hole and rushing attacks in selfdriving vehicular networks, Computers 5, vol.3, p.16, 2016.

S. Behere and M. Törngren, A functional reference architecture for autonomous driving, Information and Software Technology

O. Berlin, POSTER: Anomaly-based misbehaviour detection in connected car backends, 2016 IEEE Vehicular Networking Conference (VNC), pp.1-2, 2016.

D. Dominic, Risk Assessment for Cooperative Automated Driving, Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, pp.47-58, 2016.

. Qing-gang-fan, VANET routing replay attack detection research based on SVM, MATEC Web of Conferences, vol.63, p.5020, 2016.

. Rens-w-van-der-heijden, Survey on misbehavior detection in cooperative intelligent transportation systems, 2016.

. Mafijul-md-islam, A risk assessment framework for automotive embedded systems, Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, pp.3-14, 2016.

Z. Li, Assessing and mitigating cybersecurity risks of traffic light systems in smart cities, IET Cyber-Physical Systems: Theory & Applications, vol.1, pp.60-69, 2016.

G. Macher, Threat and risk assessment methodologies in the automotive domain, Procedia computer science, vol.83, pp.1288-1294, 2016.

C. Miller and C. Valasek, CAN Message Injection, OG Dynamite Edition, 2016.

. Cits-platform, Platform for the Deployment of Cooperative Intelligent Transport Systems in the EU (E03188)(C-ITS Platform) Final report, DG MOVE-DG Mobility and Transport, 2016.

C. Ponikwar, Beyond the Dolev-Yao model: Realistic applicationspecific attacker models for applications using vehicular communication, 2016.

. Sae-on, Road Automated Vehicle Standards Committee and others. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems, 2016.

C. Schmittner, Using SAE J3061 for Automotive Security Requirement Engineering, International Conference on Computer Safety, Reliability, and Security, pp.157-170, 2016.

M. Steger, A security metric for structured security analysis of cyber-physical systems supporting SAE J3061, Modelling, Analysis, and Control of Complex CPS (CPS Data), pp.1-6, 2016.

O. A. Wahab, CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks, Expert Systems with Applications, vol.50, pp.40-54, 2016.

W. Whyte and Z. Zhang, Quantum cryptanalysis, quantumsafe algorithms based on hard problems over lattices, and how we get there from here, 2016.

C. Yan, W. Xu, and J. Liu, Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle, DEF CON, vol.24, 2016.

M. Aeberhard, Object-level Fusion for Surround Environment Perception in Automated Driving Applications, 2017.

A. Khattab-m-ali-alheeti, K. Gruebler, and . Mcdonald-maier, Using discriminant analysis to detect intrusions in external communication for self-driving vehicles, Digital Communications and Networks, vol.3, pp.180-187, 2017.

A. Khattab, K. Alheeti, and . Mcdonald-maier, An intelligent security system for autonomous cars based on infrared sensors, 2017 23rd International Conference on Automation and Computing (ICAC), pp.1-5, 2017.

. Khattab-m-ali-alheeti, An intrusion detection scheme for driverless vehicles based gyroscope sensor profiling, 2017 IEEE International Conference on Consumer Electronics (ICCE). IEEE. 2017, pp.448-449

O. Cameron, Under the Hood of a Self-Driving Taxi, 2017.

K. Chandan, M. Alvaro, A. Seco, and . Silva, Real-time traffic signal control for isolated intersection, using car-following logic under connected vehicle environment, Transportation research procedia, vol.25, pp.1610-1625, 2017.

, Common Methodology for Information Technology Security Evaluation, Evaluation methodology, V3.1, Revision 5, Common Criteria, 2017.

A. Dosovitskiy, CARLA: An Open Urban Driving Simulator, Proceedings of the 1st Annual Conference on Robot Learning, pp.1-16, 2017.

, Man fined for painting road signs to aid his commute, 2017.

I. Evtimov, Robust Physical-World Attacks on Machine Learning Models, 2017.

A. Fuad and . Ghaleb, An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications, Application, Information and Network Security (AINS), pp.13-18, 2017.

C. Group, Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS). Tech. rep. C-ITS Platform, 2017.

P. Gu, k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks, pp.1-6, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02287500

P. Gu, Support vector machine (svm) based sybil attack detection in vehicular networks, 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE. 2017, pp.1-6
URL : https://hal.archives-ouvertes.fr/hal-02288479

J. Han, Convoy: Physical context verification for vehicle platoon admission, Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, pp.73-78, 2017.

, IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages -Amendment 1, IEEE Std 1609, pp.1-123, 2017.

I. Jemaa, An Overview of Security Ongoing Work in Cooperative ITS, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01618760

M. Kim, Collaborative security attack detection in softwaredefined vehicular networks, pp.19-24, 2017.

P. Merdrignac, O. Shagdar, and F. Nashashibi, Fusion of perception and v2p communication systems for the safety of vulnerable road users, IEEE Transactions on Intelligent Transportation Systems, vol.18, pp.1740-1751, 2017.

. Jp-monteuuis, Securing PKI Requests for C-ITS Systems, Computer Communication and Networks (ICCCN, pp.1-8, 2017.

C. Murray, Automakers, Suppliers Ratchet Up Autonomous Car Programs, 2017.

F. De and P. Müller, Survey on ranging sensors and cooperative techniques for relative positioning of vehicles, Sensors 17, vol.2, p.271, 2017.

Y. Zaydounr and . Rawashdeh, Comfortable Automated Emergency Brake for Urban Traffic Light Based on DSRC and On-Board Sensors, 2017.

B. Schoettle, Sensor fusion: A comparison of sensing capabilities of human drivers and highly automated vehicles, 2017.

S. Sharanya and . Karthikeyan, CLASSIFYING MALICIOUS NODES IN VANETS USING SUPPORT VECTOR MACHINES WITH MODI-FIED FADING MEMORY, 2017.

M. Sun, M. Li, and R. Gerdes, A data trust framework for VANETs enabling false data detection and secure vehicle tracking, Communications and Network Security (CNS), 2017 IEEE Conference, pp.1-9

. Heng-chuan-tan, A non-biased trust model for wireless mesh networks, International Journal of Communication Systems, vol.30, issue.9, 2017.

D. K. Tatlow, Scammers in China Fake Road Injuries, but Cameras Capture the Truth, 2017.

S. Ulbrich, Towards a functional system architecture for automated vehicles, 2017.

T. Yuan, Object matching for inter-vehicle communication systems-An IMM-based track association approach with sequential multiple hypothesis test, IEEE Transactions on Intelligent Transportation Systems, vol.18, pp.3501-3512, 2017.

H. Amirat, Fuzzy Clustering for Misbehaviour Detection in VANET, 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), pp.200-204, 2018.

B. Brecht, A Security Credential Management System for V2X Communications, IEEE Transactions on Intelligent Transportation Systems, 2018.

, ENCAP. Assessment Protocol-SA, 2018.

, Exploring Relationships in Body Dimensions, 2018.

E. Eziama, Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning, IEEE Globecom Workshops (GC Wkshps). IEEE, pp.1-6, 2018.

P. F. Database and . Moto, , 2018.

S. Haghighi, PyCM: Multiclass confusion matrix library in Python, Journal of Open Source Software, vol.3, p.729, 2018.

T. Rens-w-van-der-heijden, F. Lukaseder, and . Kargl, VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs, 2018.

S. Jha, Avfi: Fault injection for autonomous vehicles, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.55-56, 2018.

D. Kosmanos, RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks, 2018.

J. Monteuuis, My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension, 3 rd International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE, pp.1-8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02348444

J. Monteuuis, Attacker model for Connected and Automated Vehicles". In: 2nd Computer Science in Cars Symposium -Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles, ACM. Munich, Germany, pp.3-14, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02348436

J. Monteuuis, SARA: Security Automotive Risk Analysis Method, Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp.3-14, 2018.

S. Taxonomy, Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles, SAE Standard J3016, 2018.

, Search new cars sorted by dimensions and boot capacity, 2018.

P. Sharma, J. Petit, and H. Liu, Pearson Correlation Analysis to Detect Misbehavior in VANET, 2018 IEEE 88th Vehicular Technology Conference, pp.1-5, 2018.

P. Singh, Misbehavior detection in C-ITS using deep learning approach, International Conference on Intelligent Systems Design and Applications, pp.641-652, 2018.

C. Sitawarin, DARTS: Deceiving Autonomous Cars with Toxic Signs, 2018.

S. So, P. Sharma, and J. Petit, Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET, 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp.564-571, 2018.

B. Subba, S. Biswas, and S. Karmakar, A game theory based multi layered intrusion detection framework for VANET, Future Generation Computer Systems, vol.82, pp.12-28, 2018.

. Teoalida, Motorcycle database, 2018.

, Next Generation Simulation (NGSIM) Vehicle Trajectories and Supporting Data: Department of Transportation -Data Portal, 2018.

R. Wouter-van-der-heijden, Misbehavior detection in cooperative intelligent transport systems, 2018.

V. Vukadinovic, 3GPP C-V2X and IEEE 802.11 p for Vehicleto-Vehicle communications in highway platooning scenarios, Ad Hoc Networks, vol.74, pp.17-29, 2018.

H. Xu, High Resolution Micro Traffic Data From Roadside Li-DAR Sensors for Connected Vehicles and New Traffic Applications, NDOT Research Report, 2018.

J. Zacharias and S. Fröschle, Misbehavior detection system in VANETs using local traffic density, 2018 IEEE Vehicular Networking Conference (VNC), pp.1-4, 2018.

Y. Zeng, Senior2Local: A machine learning based intrusion detection method for vanets, International Conference on Smart Computing and Communication, pp.417-426, 2018.

, Automated Driving Toolbox. The MathWorks, 2019.

. En-etsi, 302 636-5-1 V2.2.1. Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 5: Transport Protocols; Sub-part 1: Basic Transport Protocol, 2019.

S. Gyawali and Y. Qian, Misbehavior Detection using Machine Learning in Vehicular Communication Networks, ICC 2019-2019 IEEE International Conference on Communications (ICC), pp.1-6, 2019.

N. Kaja, Artificial Intelligence and Cybersecurity: Building an Automotive Cybersecurity Framework Using Machine Learning Algorithms, 2019.

J. Kamel, CaTch: A Confidence Range Tolerant Misbehavior Detection Approach, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02126960

, Mapping Toolbox. The MathWorks, 2019.

A. Mond, Developing Longitudinal Controls for a Self-Driving Taxi, 2019.

J. Monteuuis, Sensor-V2X Correlation for Misbehavior Detection". to be submitted to a journal, 2019.

. Prescan, , 2019.

, Sensor Fusion & Tracking Toolbox. The MathWorks, 2019.

P. Singh, Machine Learning Based Approach to Detect Position Falsification Attack in VANETs, International Conference on Security & Privacy, pp.166-178, 2019.

S. So, J. Petit, and D. Starobinski, Physical layer plausibility checks for misbehavior detection in V2X networks, Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp.84-93, 2019.

L. Wang and . Vanet-toolbox, A Vehicular Network Simulator based on DES -File Exchange -MATLAB Central, 2019.

X. Wang, Location Anomalies Detection for Connected and Autonomous Vehicles, 2019.

Y. Zeng, DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET, 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp.288-293, 2019.

. Ts-etsi, Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN)". In: Methods and protocols (, vol.102, pp.2017-2027

. Ts-etsi, V1. 1.1: Intelligent Transport Systems (ITS)". In: Users and applications requirements, vol.102, pp.894-895

, URL: https:// datahub.transportation.gov/Automobiles/Safety-Pilot-Model-Deployment-Data/a7qq-9vfe

, Wyoming CV Pilot Basic Safety Message One Day Sample: Department of Transportation -Data Portal

, Information technology -Security techniques -Evaluation criteria for IT security. Standard. Geneva, CH: International Organization for Standardization, 2009.

, Information Technology -Security Techniques -Methodology for IT Security Evaluation. Standard. Geneva, CH: International Organization for Standardization, 2008.

. Iso, Road vehicles -Functional safety. Norm, 2011.

. Sae-international, Cybersecurity Guidebook for Cyber-Physical Vehicle Systems. Standard, 2016.