Btmonitor: Bit-time-based intrusion detection and attacker identification in controller area network

J Zhou, P Joshi, H Zeng, R Li - ACM Transactions on Embedded …, 2019 - dl.acm.org
With the rapid growth of connectivity and autonomy for today's automobiles, their security
vulnerabilities are becoming one of the most urgent concerns in the automotive industry. The …

Topology verification enabled intrusion detection for in-vehicle CAN-FD networks

T Yu, X Wang - IEEE Communications Letters, 2019 - ieeexplore.ieee.org
Controller area network with flexible data rate (CAN-FD) is a widely used communication
protocol for in-vehicle sensing and control. However, due to the lack of inherent security …

Ecu fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks

A Hafeez, K Topolovec, S Awad - 2019 15th International …, 2019 - ieeexplore.ieee.org
Fully connected autonomous vehicles are more vulnerable than ever to hacking and data
theft. The controller area network (CAN) protocol is used for communication between in …

Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus

HK Kalutarage, MO Al-Kadri, M Cheah… - Proceedings of the 3rd …, 2019 - dl.acm.org
Automotive electronics is rapidly expanding. An average vehicle contains million lines of
software codes, running on 100 of electronic control units (ECUs), in supporting number of …

Cyberattacks and countermeasures for intelligent and connected vehicles

F Luo, S Hou - SAE International Journal of Passenger Cars …, 2019 - sae.org
ICVs are expected to make the transportation safer, cleaner, and more comfortable in the
near future. However, the trend of connectivity has greatly increased the attack surfaces of …

Procedimiento de diseño de sistemas ciberfísicos de tiempo real tolerantes a ataques cibernéticos

CMP Valencia - Encuentro Internacional de Educación en …, 2019 - acofipapers.org
Los sistemas ciberfísicos consisten en una combinación de dispositivos móviles, sistemas
integrados y computadoras que se usan para monitorear, detectar y actuar sobre elementos …

[引用][C] INTRUSION DETECTION BASED ON DEEP LEARNING TECHNIQUES IN COMPUTER NETWORKS

LKS Kumar - Turkish Journal of Computer and Mathematics …, 2019