This article is from the free online course:

Automotive Cyber Security: An Introduction

Coventry University