Skip to main content
Log in

Methodological Approaches to Data Protection and Security in Networked ECUs

  • Cover Story
  • Consumer Electronics
  • Published:
ATZelektronik worldwide Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

FIGURE 1
FIGURE 2
FIGURE 3

References

  1. ISO 26262

  2. ETSI TS 102 165-1 V4.2.3 from 2011: Method and Pro Forma for Threat, Risk, Vulnerability Analysis: http://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.03_60/ts_10216501v040203p.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Knechtel, H. Methodological Approaches to Data Protection and Security in Networked ECUs. ATZ Elektron Worldw 10, 4–9 (2015). https://doi.org/10.1007/s38314-015-0500-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s38314-015-0500-6

Keywords

Navigation