-
1
-
-
84864989578
-
Data link layer and physical signaling
-
ISO 11898-1, International Standards Organization (ISO), ISO Standard 11898-1
-
ISO 11898-1, "Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signaling," International Standards Organization (ISO), ISO Standard 11898-1, 2003.
-
(2003)
Road Vehicles - Controller Area Network (CAN)
, Issue.PART 1
-
-
-
2
-
-
84865005980
-
High-speed medium access unit
-
ISO 11898-2, International Standards Organization (ISO), ISO Standard 11898-2
-
ISO 11898-2, "Road vehicles - Controller area network (CAN) - Part 2: High-speed medium access unit," International Standards Organization (ISO), ISO Standard 11898-2, 2003.
-
(2003)
Road Vehicles - Controller Area Network (CAN)
, Issue.PART 2
-
-
-
3
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," IEEE Symposium on Security and Privacy 2010, pp. 447 - 462, 2010.
-
(2010)
IEEE Symposium on Security and Privacy 2010
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," the 20th USENIX Security Symposium, 2011.
-
The 20th USENIX Security Symposium, 2011
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
5
-
-
56449088090
-
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures" In Proceedings of the 27th international conference on Computer Safety, Reliability, and Security, SAFECOMP '08, pp. 235-248, 2009.
-
(2009)
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP '08
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
8
-
-
84865029451
-
Anomaly Detection for In-Vehicle Networks Using a Sensor-Based Approach
-
2011
-
M. Müter, A. Groll, and F. Freiling, "Anomaly Detection for In-Vehicle Networks Using a Sensor-Based Approach," Journal of Information Assurance and Security (JIAS), Volume 6, 2 (2011), 132-140, 2011.
-
(2011)
Journal of Information Assurance and Security (JIAS)
, vol.6
, Issue.2
, pp. 132-140
-
-
Müter, M.1
Groll, A.2
Freiling, F.3
-
9
-
-
77956249542
-
Applying Intrusion Detection to Automotive IT - Early Insights and Remaining Challenge
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Applying Intrusion Detection to Automotive IT - Early Insights and Remaining Challenge," Journal of Information Assurance and Security (JIAS), pp. 226-235, 2009.
-
(2009)
Journal of Information Assurance and Security (JIAS)
, pp. 226-235
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
|