Video-Server > Vorlesungen > Car IT and Cybersecurity

Car IT and Cybersecurity

by Prof. Dr.-Ing. Dietmar P. F. Möller

30:31 hrs548 Views19.Sep.2017

Information about the player

Please activate javascript in order to play the recordings on this website. For the Internet Explorer the current version of the Adobe Flash Player is needed. The Internet Explorer is only supported in version 11. The playback with the Internet Exporer is not possible in Windows 8 or higher.


Lectures


LO 0: Overview

Lecture no. 1

40:39 min10.Apr.201761 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview

LO 1: Introduction to Car IT

Lecture no. 2

56:56 min10.Apr.201735 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Learning Scope of LO 1,
Introduction to Car IT

LO 1: Introduction to Car IT

Lecture no. 3

01:18 hrs21.Apr.201725 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Mechatronic Systems in the Car,
Automotive Electronics

LO 1: Introduction to Car IT

Lecture no. 4

01:22 hrs24.Apr.201727 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
E/E Architectures and Bus Requirements

LO 1: Introduction to Car IT

Lecture no. 5

01:19 hrs28.Apr.20175 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Automotive Software Engineering,
AUTOSAR

LO 8: Topics Student Team Project Work

Lecture no. 6

17:03 min05.May.201716 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Student Team Project Work Topics

Student Team Project Work Presentations

Lecture no. 7

01:25 hrs05.May.201729 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack scenarios and attack mechanism in cars,
IT in Domains Intrusion Detection in connected cars,
Ideal based Cyber Security technical metrics for Control Systems,
Safety in car ride sharing,
Attack surfaces in Cybersecurity

LO 2: Connected Cars

Lecture no. 8

01:30 hrs08.May.201718 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Learning Scope of LO 2,
Introduction to Cyber-Physical Systems

Attack scenarios and attack mechanisms in cars

Lecture no. 9

16:17 min12.Jun.201711 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

IT in domains intrusion detection in connected cars

Lecture no. 10

11:59 min12.Jun.201714 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

IT in domains intrusion detection in connected cars

Lecture no. 11

16:44 min12.Jun.201711 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Methods for identification, authentication and authorization

Lecture no. 12

21:10 min12.Jun.201714 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Attack surfaces in Cybersecurity

Lecture no. 13

39:36 min12.Jun.20179 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Cybersecurity risks in Advanced Driver-Assistance Systems (ADAS)

Lecture no. 14

10:11 min15.Jun.201719 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

LO 3: Introduction to Cybersecurity

Lecture no. 15

01:36 hrs19.Jun.201712 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Cybersecurity and Volunerability of CPS

LO 3: Introduction to Cybersecurity

Lecture no. 16

01:19 hrs23.Jun.201711 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Cybersecurity and Vulnerability of CPS

LO 3: Introduction to Cybersecurity

Lecture no. 17

01:39 hrs26.Jun.201711 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Importance of Cybersecurity,
Cybersecurity in Automotive IT

LO3: Introduction to Cybersecurity

Lecture no. 18

01:22 hrs30.Jun.201713 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack Value Chain,
Holistic Cybersecurity Solutions

LO 4: IT Security in Cyber-Physical Systems

Lecture no. 19

01:21 hrs04.Jul.201712 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Learning Scope of LO 4,
Introduction into IT Security,
IT Security in Cyber-Physical Systems

LO4: IT Security in Cyber-Physical Systems

Lecture no. 20

01:25 hrs07.Jul.201711 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
IT Security in Cyber-Physical System,
Intrusion Detection,
Cyber-Physical System Security Objectives

Car IT and Cybersecurity II LO 0: Individual Research Project

Lecture no. 21

39:58 min17.Jul.201714 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Topics of Individual Research Projects

LO5: Hacking, Attack Surfaces, and Vulnerabilities

Lecture no. 22

45:43 min17.Jul.201712 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Hacking,
Attack Surfaces and Vulnerabillities,
Vulnerabillities

Presentation Schedule

Lecture no. 23

06:02 min24.Jul.20178 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

LO7: Security and Functional Safety

Lecture no. 24

01:31 hrs21.Jul.20179 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Learning Scope of LO 7,
Introduction, Security for Wireless Mobile Networks,
Security for Wireless Sensor Networks,
Platform Security,
Cloud Computing and Data Security

IT in Domains Intrusion Detection in Connected Cars

Lecture no. 25

26:01 min25.Jul.201716 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Attack Scenarios and Attack Mechanisms in Cars

Lecture no. 25

53:30 min25.Jul.20173 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Attack Analysis on Inter Vehicle Communication Systems

Lecture no. 26

38:10 min25.Jul.201713 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Cybersecurity Risks in ADAS: Safety and Security of Driver Assistance Systems

Lecture no. 27

30:12 min25.Jul.201712 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Identification Methods to Secure Access to the Cloud

Lecture no. 29

40:17 min25.Jul.201721 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Millennials at Industry 4.0 - Opportunities and Challenges

Lecture no. 30

52:04 min25.Jul.201713 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Machine Learning for cyber physical systems and Industry 4.0

Lecture no. 31

27:48 min25.Jul.20179 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Technology Adoption and Diffusion

Lecture no. 32

34:21 min25.Jul.20177 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Applications of UAV in Smart Cities- Opportunities and Threats

Lecture no. 33

23:37 min25.Jul.20176 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Is India ready for Manufacturing 4.0

Lecture no. 34

37:02 min25.Jul.20177 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Operations Management in Cyber Physical Production Systems

Lecture no. 35

37:42 min25.Jul.20176 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Attack surfaces in cybersecurity

Lecture no. 36

47:24 min25.Jul.201712 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Ideal Based Cyber Security Technical Metrics for Control Systems

Lecture no. 37

27:48 min25.Jul.201716 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.


Impressum · Kontakt© TU Clausthal 2017