-
1
-
-
21644462279
-
Trends in Automotive Communication Systems
-
Navet N., Song Y., Simonot-Lion F., and Wilwert C., " Trends in Automotive Communication Systems," Proc. of the IEEE, vol. 93, no. 6, p. 1204-1223, 2005, doi: http://dx.doi.org/10.1109/JPROC.2005.849725 10.1109/JPROC.2005.849725.
-
(2005)
Proc. of the IEEE
, vol.93
, Issue.6
, pp. 1204-1223
-
-
Navet, N.1
Song, Y.2
Simonot-Lion, F.3
Wilwert, C.4
-
2
-
-
84859921075
-
Comprehensive Experimental Analyses of Automotive Attack Surfaces
-
Checkoway S., Mccoy D., Kantor B., et al, " Comprehensive Experimental Analyses of Automotive Attack Surfaces," Usenix Security Symposium. 2011: 43-43.
-
(2011)
Usenix Security Symposium
, pp. 43
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
-
3
-
-
84929768227
-
A Survey of Remote Automotive Attack Surfaces
-
http://illmatics.com/remote attack surfaces.pdf
-
Charlie Miller, Chris Valasek., " A Survey of Remote Automotive Attack Surfaces," Defcon 22: 1-90. Retrieved from http://illmatics.com/remote%20attack%20surfaces.pdf http://illmatics.com/remote attack surfaces.pdf.
-
Defcon
, vol.22
, pp. 1-90
-
-
Charlie, M.1
Chris, V.2
-
4
-
-
85028151945
-
Potential Cyberattacks on Automated Vehicles
-
Petit J., Shladover S. E., " Potential Cyberattacks on Automated Vehicles," IEEE Transactions on Intelligent Transportation Systems, 2015, 16 (2): 546-556, doi: http://dx.doi.org/10.1109/TITS.2014.2342271 10.1109/TITS.2014.2342271.
-
(2015)
IEEE Transactions on Intelligent Transportation Systems
, vol.16
, Issue.2
, pp. 546-556
-
-
Petit, J.1
Shladover, S.E.2
-
5
-
-
78651579602
-
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
-
september
-
Nilsson D. K., Larson U. E., " A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure," Journal of Networks, vol. 4, no. 7, september, 2009: 552-564, doi: http://dx.doi.org/10.4304/jnw.4.7.552-564 10.4304/jnw.4.7.552-564.
-
(2009)
Journal of Networks
, vol.4
, Issue.7
, pp. 552-564
-
-
Nilsson, D.K.1
Larson, U.E.2
-
6
-
-
70449553428
-
Secure and authentic communication on existing in-vehicle networks
-
Groll A., Ruland C., " Secure and authentic communication on existing in-vehicle networks," Intelligent Vehicles Symposium. IEEE, 2009: 1093-1097, doi: http://dx.doi.org/10.1109/IVS.2009.5164434 10.1109/IVS.2009.5164434.
-
(2009)
Intelligent Vehicles Symposium. IEEE
, pp. 1093-1097
-
-
Groll, A.1
Ruland, C.2
-
7
-
-
84945916978
-
Lightweight authentication for secure automotive networks
-
Mundhenk P., Steinhorst S., Lukasiewycz M., et al, " Lightweight authentication for secure automotive networks," Conference on Design, Automation and Test in Europe. 2015: 1-4.
-
(2015)
Conference on Design, Automation and Test in Europe
, pp. 1-4
-
-
Mundhenk, P.1
Steinhorst, S.2
Lukasiewycz, M.3
-
8
-
-
79960771504
-
Security aspects of the in-vehicle network in the connected car
-
Kleberger P., Olovsson T., Jonsson E., " Security aspects of the in-vehicle network in the connected car," Intelligent Vehicles Symposium. IEEE Xplore, 2011: 528-533, doi: http://dx.doi.org/10.1109/IVS.2011.5940525 10.1109/IVS.2011.5940525.
-
(2011)
Intelligent Vehicles Symposium. IEEE Xplore
, pp. 528-533
-
-
Kleberger, P.1
Olovsson, T.2
Jonsson, E.3
-
9
-
-
56449111413
-
Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
-
Salzburg, Austria
-
Hoppe T., Dittman J., " Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy," In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
-
(2007)
Proceedings of the 2nd Workshop on Embedded Systems Security (WESS)
-
-
Hoppe, T.1
Dittman, J.2
-
10
-
-
57749193296
-
An approach to specification-based attack detection for in-vehicle networks
-
Larson U. E., Nilsson D. K., Jonsson E., " An approach to specification-based attack detection for in-vehicle networks," Intelligent Vehicles Symposium. IEEE Xplore, 2008: 220-225, doi: http://dx.doi.org/10.1109/IVS.2008.4621263 10.1109/IVS.2008.4621263.
-
(2008)
Intelligent Vehicles Symposium. IEEE Xplore
, pp. 220-225
-
-
Larson, U.E.1
Nilsson, D.K.2
Jonsson, E.3
-
11
-
-
79960791793
-
Entropy-Based Anomaly Detection for In-Vehicle Networks
-
Baden-Baden, Germany, June 5-9
-
Michael Müter, Naim Asaj., " Entropy-Based Anomaly Detection for In-Vehicle Networks," 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, June 5-9, 2011: 528-533, doi: http://dx.doi.org/10.1109/IVS.2011.5940552 10.1109/IVS.2011.5940552.
-
(2011)
2011 IEEE Intelligent Vehicles Symposium (IV)
, pp. 528-533
-
-
Michael, M.1
Naim, A.2
-
13
-
-
78649321196
-
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
-
Tobias Hoppe, Stefan Kiltz, Jana Dittmann., " Security Threats to Automotive CAN Networks-Practical Examples and Selected Short-Term Countermeasures," Reliability Engineering and System Safety, 96, 2011, 11-25, doi: http://dx.doi.org/10.1007/978-3-540-87698-4-21 10.1007/978-3-540-87698-4-21.
-
(2011)
Reliability Engineering and System Safety
, vol.96
, pp. 11-25
-
-
Tobias, H.1
Stefan, K.2
Jana, D.3
-
15
-
-
84913585338
-
A fault diagnosis method based on ANFIS and bearing fault diagnosis
-
Zhang J., Ma W., Ma L., " A fault diagnosis method based on ANFIS and bearing fault diagnosis," The 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014, 2014: 1274-1278, doi: http://dx.doi.org/10.1109/InfoSEEE.2014.6947876 10.1109/InfoSEEE.2014.6947876.
-
(2014)
The 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014
, pp. 1274-1278
-
-
Zhang, J.1
Ma, W.2
Ma, L.3
|