[PDF][PDF] IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication.

S Ohira, AK Desta, I Arai, K Fujikawa - ICISSP, 2023 - scitepress.org
Cyberattacks on In-Vehicle Networks (IVNs) are becoming the most urgent issue. The
Controller Area Network (CAN), one of the IVNs, is a standard protocol for automotive …

A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network

M Batzorig, Y Koh, I Oh, K Yim - International Conference on Network …, 2023 - Springer
As technology advances, the mechanical components of vehicles are being replaced by
microcontrollers known as Electronic Control Units (ECUs). These ECUs connect to form an …

DoS Detection on In-Vehicle Networks: Evaluation on an Experimental Embedded System Platform

MD Grammatikakis, N Mouzakitis, L Kypraios… - … on Applications in …, 2021 - Springer
Modern vehicles involve engine control units that communicate over multiple in-vehicle
networks via a traditional Gateway. In this context, we develop an open, experimental …

In-vehicle network monitoring with network tomography

AMA Ibraheem - 2023 - sussex.figshare.com
With the advances in Connected and Autonomous Vehicles (CAVs), the in-vehicle network
becomes more complex and harder to manage. In addition, as the vehicle becomes part of …

Intelligent Connected Vehicles

W Wu, R Kurachi, G Zeng, Y Wang… - … and High-Performance …, 2022 - taylorfrancis.com
Intelligent Connected Vehicle (ICV) is a typical automotive cyber-physical system (ACPS),
which integrates sensing, computing, networks, and control functions. The functional safety …

[PDF][PDF] Hybrid RNN-LSTM Networks for Enhanced Intrusion Detection in Vehicle CAN Systems

N Al-Aql, A Al-Shammari - Journal of Electrical Systems, 2024 - pdfs.semanticscholar.org
Electric vehicles (EVs) use electric motors for propulsion, relying on electric energy stored in
batteries or other energy storage devices. The standard communication protocol used in …

A Case Study: What Leadership Competencies Do Cybersecurity Managers Need in the Post-COVID-19 Remote Work Environment

SK Boateng - 2024 - search.proquest.com
This research investigates the essential leadership competencies required by cybersecurity
managers in the post-COVID-19 remote work environment to implement organizations' …

VehicleCIDS: an efficient vehicle intrusion detection system based on clock behavior

Y Zhao, Y Xun, J Liu - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
Nowadays, more and more external interfaces are added into intelligent and connected
vehicles. The in-vehicle network, especially the controller area network (CAN), is no longer a …

Weighted local outlier factor for detecting anomaly on in-vehicle network

Y Linghu, M Xu, X Li, H Qian - 2020 16th International …, 2020 - ieeexplore.ieee.org
Modern vehicles are generally equipped with dozens of (or even hundreds of) electronic
and intelligent devices and bloom into more involved information hub in enabling V2X …

Data-Driven Approach for Damage Detection Leveraging the Digital Thread

S Malik - 2024 - search.proquest.com
Damage incubation, initiation and growth in materials and structures represents a significant
engineering challenge related to their safe use, maintenance and remaining useful life in …