暂无分享,去创建一个
[1] Qiyan Wang,et al. VeCure: A practical security framework to protect the CAN bus of vehicles , 2014, 2014 International Conference on the Internet of Things (IOT).
[2] Wei Wang,et al. The design of communication convertor based on CAN bus , 2008, 2008 IEEE International Conference on Industrial Technology.
[3] Manuel Barbosa,et al. An overview of controller area network , 1999 .
[4] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[5] Jörg Kaiser,et al. Implementing the real-time publisher/subscriber model on the controller area network (CAN) , 1999, Proceedings 2nd IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'99) (Cat. No.99-61702).
[6] Felix C. Freiling,et al. A structured approach to anomaly detection for in-vehicle networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[7] Hafiz Malik,et al. Linking received packet to the transmitter through physical-fingerprinting of controller area network , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[8] Farzin Piltan,et al. Design Minimum Rule-Base Fuzzy Inference Nonlinear Controller for Second Order Nonlinear System , 2014 .
[9] Alan Burns,et al. Guaranteeing message latencies on controller area network (can) , 1994 .
[10] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[11] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[12] Farzin Piltan,et al. Design New Online Tuning Intelligent Chattering Free Fuzzy Compensator , 2014 .
[13] Farzin Piltan,et al. Design High Efficiency-Minimum Rule Base PID Like Fuzzy Computed Torque Controller , 2014 .
[14] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[15] Alberto L. Sangiovanni-Vincentelli,et al. Cyber-Security for the Controller Area Network (CAN) Communication Protocol , 2012, 2012 International Conference on Cyber Security.
[16] Farzin Piltan,et al. Design New Robust Self Tuning Fuzzy Backstopping Methodology , 2014 .
[17] Mohammad A. Al-Khedher,et al. Intelligent Anti-Theft and Tracking System for Automobiles , 2012 .
[18] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[19] Radovan Miucic,et al. Firmware Update Over The Air (FOTA) for Automotive Industry , 2007 .
[20] Farzin Piltan,et al. Design a Novel SISO Off-line Tuning of Modified PID Fuzzy Sliding Mode Controller , 2014 .
[21] Hafiz Malik,et al. Comparative Study of CAN-Bus and FlexRay Protocols for In-Vehicle Communication , 2017 .
[22] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[23] Erland Jonsson,et al. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.
[24] Farzin Piltan,et al. Research on Minimum Intelligent Unit for Flexible Robot , 2015 .
[25] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[26] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[27] Anupam Joshi,et al. Using Data Analytics to Detect Anomalous States in Vehicles , 2015, ArXiv.