Transmission line cybersecurityhttps://repo.valu3s.eu/use-cases/uc2-car-teleoperation/evaluation-scenarios/transmission-line-cybersecurityhttps://repo.valu3s.eu/@@site-logo/logo_valu3s_green_transparent.png
Transmission line cybersecurity
VALU3S_WP1_Automotive_14
Evaluate cases of man-in-the-middle attacks tampering with data
Teleoperated vehicle cybersecurity in both lab and open environment.