Research Article

Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

Figure 1

Schematic view of driving tasks [20].