A generic taxonomy for steganography methods

S Wendzel, L Caviglione, W Mazurczyk, A Mileva… - Authorea …, 2023 - techrxiv.org
A unified understanding of terms and their applicability is essential for every scientific
discipline: steganography is no exception. Being divided into several domains (for instance …

Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles

M Jedh, JK Lee - … on Software Quality, Reliability and Security …, 2022 - ieeexplore.ieee.org
Attackers demonstrated the use of remote access to the in-vehicle network of connected
vehicles to take control of these vehicles. Machine-learning-based Intrusion Detection …

Proactive Vulnerability Identification and Defense Construction–The Case for Can

KS Alsharif - 2023 - search.proquest.com
The progressive integration of microcontrollers into various domains has transformed
traditional mechanical systems into modern cyber-physical systems. However, the beginning …

PROACTIVE VULNERABILITY IDENTIFICATION AND DEFENSE CONSTRUCTION--THE CASE FOR CAN

K Serag Alsharif - 2023 - hammer.purdue.edu
The progressive integration of microcontrollers into various domains has transformed
traditional mechanical systems into modern cyber-physical systems. However, the beginning …

Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty Vehicles

D Nnaji, J Daily - 2024 - sae.org
Automotive researchers and industry experts have extensively documented vulnerabilities
arising from unauthorized in-vehicle communication through academic research, industry …

Towards cybersecurity countermeasures for SAE J1708/1587 network protocol in heavy-duty vehicles

DC Nnaji, J Daily, S Simske, S Pasricha, I Ray - 2021 - mountainscholar.org
Heavy vehicles are crucial to a functioning economy and society since they are responsible
for delivering people and goods across the country. These systems rely on various forms of …

[引用][C] EVALUATION OF THE ARCHITECTURE SOLUTIONS FOR REAL-TIME INTRUSION DETECTION SYSTEMS FOR CONNECTED VEHICLES

M Jedh, JKLL ben Othmane - Attacks detection and cyber resilience: Securing in …, 2023