

JACK RANSOMWHERE SOFTWARE
In European Conference on Software Process Improvement. Status of the Development of ISO/SAE 21434.

Ransomware: Evolution, mitigation and prevention. Method and apparatus for security assessment of a computing platform. In International Conference on Risks and Security of Internet and Systems. Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, and Axel Legay.CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Remote exploitation of an unaltered passenger vehicle. Hacking the human: social engineering techniques and security countermeasures. In 2009 IEEE International Symposium on Industrial Embedded Systems. An in-vehicle infotainment software architecture based on google android. Gianpaolo Macario, Marco Torchiano, and Massimo Violante.The best available technologies for computer security. In 2018 13th Asia Joint Conference on Information Security (AsiaJCIS). Constructing a Complete Timeline of a Security Incident by Aggregating Reports. Hiroki Kuzuno, Shun Inagaki, and Kenichi Magata.Getting started with QNX Neutrino 2: a guide for realtime programmers. In 2010 IEEE Symposium on Security and Privacy. Experimental security analysis of a modern automobile. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et al.DDoS in the IoT: Mirai and other botnets. Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas.In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Cutting the gordian knot: A look under the hood of ransomware attacks. Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda.Automotive cybersecurity: assessing a new platform for cybercrime and malicious hacking. Jay Kennedy, Thomas Holt, and Betty Cheng.Volkswagen Car Entertainment System Forensics. Daniel Jacobs, Kim-Kwang Raymond Choo, M-Tahar Kechadi, and Nhien-An Le-Khac.Transportation Research Part A: Policy and Practice 91 (2016), 80-104. Influence of composition, amount and life span of passenger cars on end-of-life vehicles waste in Belgium: A system dynamics approach. Dirk Inghels, Wout Dullaert, Birger Raa, and Grit Walther.In USENIX Workshop on Microkernels and Other Kernel Architectures. Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova.Hackers remotely kill a jeep on the highway-With me in it. SAE International Journal of Passenger Cars-Electronic and Electrical Systems 3, 19 (2010), 99-105.
JACK RANSOMWHERE WINDOWS
Ford SYNC and Microsoft Windows Embedded Automotive Make Digital Lifestyle a Reality on the Road. In 2014 IEEE world forum on internet of things (WF-IoT). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds.

IEEE Vehicular Technology Magazine 12, 2 (2017), 45-51. Driving with sharks: Rethinking connected vehicles with vehicle cybersecurity. In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). Improving network security monitoring for industrial control systems. Tiago Cruz, Jorge Barrigas, Jorge Proença, Antonio Graziano, Stefano Panzieri, Leonid Lev, and Paulo Simões.In 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C). Security Patterns for Automotive Systems. Information security risk management for ISO27001/ISO27002. In 2018 APWG Symposium on Electronic Crime Research (eCrime). A key-managementbased taxonomy for ransomware. Pranshu Bajpai, Aditya K Sood, and Richard Enbody.Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al.
