Intrusion Detection System in Intelligent Connected Vehicles Based on Two-Step Algorithm

T Liu, Y Jian, T Chong, X Lu, P Liu… - … Conference on Digital …, 2023 - atlantis-press.com
Intelligent connected vehicles are an inseparable object in the Internet of Things. The
automotive industry is facing enormous challenges when it comes to ensuring the safety and …

Machine Learning Techniques and Models for Situation Awareness of IoT based Complex Systems

D Santaniello - 2022 - elea.unisa.it
The current reality is characterized by a solid technological and pervasive component.
These elements are expressed through smart devices, which make the environments we live …

[图书][B] Security Enhancement of Vehicle Software Systems

LJ Moukahal - 2021 - search.proquest.com
In an era of connectivity and automation, the vehicle industry is adopting various
technologies to transfer driver-centric vehicles to intelligent mechanical devices driven by …

[PDF][PDF] EUROPEAN COMMISSION HORIZON 2020 LC-MG-1-4-2018 Grant agreement ID: 814951

G Baldini, JRCB Siegel - dias-project.com
Executive summary Cybersecurity testing of the vehicles has received increased level of
attention from the regulatory, industry and research community in recent years because of …

[引用][C] Vitrobench: Manipulating In-Vehicle Networks and Cots Ecus on Your Bench: A Comprehensive Testbed for Automotive Cybersecurity Research

AKT Yeo, ME Garbelini, S Chattopadhyay, J Zhou - Available at SSRN 4340802

[PDF][PDF] Context and General Objectives

A Team - telecom-paris.fr
Cyber-physical systems (CPSs) have been receiving increasing interest from both
researchers and industrial practitioners. These are smart embedded systems eg, vehicles …

[PDF][PDF] On the impact of lightweight ciphers in automotive networks

A Castiglione, F Palmieri, F Colace… - Journal of Visual …, 2020 - scholar.archive.org
The ever more exposure of modern vehicles to computer networks has led, in recent years,
to increase risks due to cyberattacks. The internal computer network of vehicles, used to …

[PDF][PDF] CERES–Thesis proposal# 1 on Security Modelization and Assessment

A Team - cloudgravity.github.io
Objectives The objective of this thesis is two-fold: i) propose ways to accurately model a
process, a function, a system, and a system of systems, as well as the security threats and …

[PDF][PDF] Toward the creation of a personal device security testbed to aid student learning objectives

C Walter, C Fleming - Journal of Computing Sciences in Colleges, 2020 - ccsc.org
In this paper, we propose the creation of a testbed that will allow instructors to effectively
teach security of personal devices, including wearables and smart home computing devices …

In-Vehicle CAN Network MessageTampering and Forgery Detection Architecture Based on Data Information Redundancy

J Qin, H Yu, R Zhao, GH Qin… - … Conference on Information …, 2017 - ieeexplore.ieee.org
Controller Area Network (CAN) is one of the most important in-vehicle networks. The data
are mainly sensor signals or control commands. There is correlation between the data …