State of the art survey on comparison of physical fingerprinting-based intrusion detection techniques for in-vehicle security

A Hafeez, K Rehman, H Malik - 2020 - sae.org
Controller area network (CAN) is used as a legacy protocol for in-vehicle communication.
However, it lacks basic security features such as message authentication, integrity …

轨道交通移动边缘计算网络安全综述

谢人超, 文雯, 唐琴琴, 刘云龙, 谢高畅, 黄韬 - 通信学报, 2023 - infocomm-journal.com
在环境复杂, 乘客密集, 高速移动的轨道交通场景中引入移动边缘计算(MEC)
技术可满足其对低时延, 移动性和海量连接等的需求. 然而, MEC 在改善轨道交通通信网络性能 …

[HTML][HTML] In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms

G Baldini - Information, 2023 - mdpi.com
Cybersecurity in modern vehicles has received increased attention from the research
community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques …

Segment detection algorithm: CAN bus intrusion detection based on bit constraint

K Zheng, S Zou, G Xu, Z Bi - … Symposium on a World of Wireless …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet of Vehicles and autonomous driving technologies, car
manufacturers provide more comfortable and safe driving experience while gradually …

[HTML][HTML] Granular Description of Uncertain Data for Classification Rules in Three-Way Decision

X Zhang, T Ouyang - Applied Sciences, 2022 - mdpi.com
Considering that data quality and model confidence bring threats to the confidence of
decision-making, a three-way decision with uncertain data description is more meaningful in …

A computational method for small molecule-RNA binding sites identification by utilizing position specificity and complex network information

L Zhang, K Xiao, L Kong - Biosystems, 2024 - Elsevier
Some computational methods have been given for small molecule-RNA binding site
identification due to that it plays a significant role in revealing biology function researches …

A Framework for Consistent and Repeatable Controller Area Network IDS Evaluation

P Agbaje, A Anjum, A Mitra, G Bloom… - … Workshop on Automotive …, 2022 - par.nsf.gov
The landscape of automotive vehicle attack surfaces continues to grow, and vulnerabilities
in the controller area network (CAN) expose vehicles to cyber-physical risks and attacks that …

Systematic Review on the Recent Trends of Cybersecurity in Automobile Industry

CP Eze, J Emmanuel, CIO Onietan… - … and Business for …, 2023 - ieeexplore.ieee.org
The increasing integration of technology in automobiles has raised industry concerns about
cyber-security. This paper provides an overview of the most recent developments in …

[HTML][HTML] An entropy analysis-based window size optimization scheme for merging LiDAR data frames

T Kim, J Jung, H Min, YH Jung - Sensors, 2022 - mdpi.com
LiDAR is a useful technology for gathering point cloud data from its environment and has
been adapted to many applications. We use a cost-efficient LiDAR system attached to a …

Wsg-inv: Weighted state graph model for intrusion detection on in-vehicle network

Y Linghu, X Li - 2021 IEEE Wireless Communications and …, 2021 - ieeexplore.ieee.org
The paper presents WSG-InV, a novel weighted state graph (WSG) model for lightweight IDS
on in-vehicle network. By capitalizing on historical in-vehicle data of timestamps, message …