{"id":6414,"date":"2019-09-24T12:10:38","date_gmt":"2019-09-24T16:10:38","guid":{"rendered":"https:\/\/cecas.clemson.edu\/C2M2\/?p=6414"},"modified":"2019-09-24T12:10:38","modified_gmt":"2019-09-24T16:10:38","slug":"cybersecurity-for-connected-and-autonomous-vehicles","status":"publish","type":"post","link":"https:\/\/cecas.clemson.edu\/C2M2\/cybersecurity-for-connected-and-autonomous-vehicles\/","title":{"rendered":"Cybersecurity for Connected and Autonomous Vehicles"},"content":{"rendered":"\n<p> Mashrur &#8220;Ronnie&#8221; Chowdhury, our Center Director, recently published an article for the National Academy of Engineering&#8217;s flagship magazine, <strong>The Bridge<\/strong>. The article focuses on exploring cyberattack surfaces of connected and automated vehicles and transportation infrastructure.  You can find this article in its entirety both in our <a href=\"https:\/\/documentcloud.adobe.com\/link\/track?uri=urn%3Aaaid%3Ascds%3AUS%3A60ee2222-b5a0-4c3e-bd98-805f8acf1c28\">publications page<\/a> and on the NAE&#8217;s website here:  <a href=\"https:\/\/www.nae.edu\/216540\/Security-of-Connected-and-Automated-Vehicles\">https:\/\/www.nae.edu\/216540\/Security-of-Connected-and-Automated-Vehicles<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mashrur &#8220;Ronnie&#8221; Chowdhury, our Center Director, recently published an article for the National Academy of Engineering&#8217;s flagship magazine, The Bridge. The article focuses on exploring cyberattack surfaces of connected and automated vehicles and transportation infrastructure. You can find this article&#8230; <a href=\"https:\/\/cecas.clemson.edu\/C2M2\/cybersecurity-for-connected-and-autonomous-vehicles\/\" class=\"readmore\">Read more<span class=\"screen-reader-text\">Cybersecurity for Connected and Autonomous Vehicles<\/span><span class=\"fa fa-angle-double-right\" aria-hidden=\"true\"><\/span><\/a><\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6414","post","type-post","status-publish","format-standard","hentry","category-uncategorized","content-layout-excerpt-thumb"],"_links":{"self":[{"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/posts\/6414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/comments?post=6414"}],"version-history":[{"count":1,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/posts\/6414\/revisions"}],"predecessor-version":[{"id":6423,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/posts\/6414\/revisions\/6423"}],"wp:attachment":[{"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/media?parent=6414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/categories?post=6414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/C2M2\/wp-json\/wp\/v2\/tags?post=6414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}