Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Model of connected vehicle (vehicle ecosystem)     
 7     Threats to connected vehicles or vehicle ecosystem and potential information related to threats    
        7.1     Threats to connected vehicles or vehicle ecosystem   
        7.2     Potential information related to threats           
Appendix I – Examples of vulnerability or attack method related to threats    
Bibliography