VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
暂无分享,去创建一个
Dong Hoon Lee | Wonsuk Choi | Hyo Jin Jo | Moon Chan Park | Kyungho Joo | Kyungho Joo | H. Jo | W. Choi | M. Park
[1] Bogdan Groza,et al. Source Identification Using Signal Characteristics in Controller Area Networks , 2014, IEEE Signal Processing Letters.
[2] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[3] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[4] Gert Cauwenberghs,et al. SVM incremental learning, adaptation and optimization , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[5] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[6] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[7] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] R. Tibshirani. Regression Shrinkage and Selection via the Lasso , 1996 .
[9] Peng Liu,et al. From Physical to Cyber: Escalating Protection for Personalized Auto Insurance , 2016, SenSys.
[10] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[11] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[12] Stefan Savage,et al. Fast and Vulnerable: A Story of Telematic Failures , 2015, WOOT.
[13] Sang H. Son,et al. An Analysis of Voltage Drop as a Security Feature in Controller Area Network , 2016 .
[14] Chen Yang,et al. Smartwatch User Identification as a Means of Authentication , 2016 .
[15] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[16] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[17] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[18] Gunnar Rätsch,et al. An introduction to kernel-based learning algorithms , 2001, IEEE Trans. Neural Networks.
[19] Robert Bosch,et al. CAN with Flexible Data-Rate , 2012 .
[20] Larry A. Rendell,et al. A Practical Approach to Feature Selection , 1992, ML.
[21] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[22] D.K. Nilsson,et al. An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[23] Deng Cai,et al. Laplacian Score for Feature Selection , 2005, NIPS.
[24] Dong Hoon Lee,et al. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks , 2016, IEEE Transactions on Vehicular Technology.
[25] Jane Labadin,et al. Feature selection based on mutual information , 2015, 2015 9th International Conference on IT in Asia (CITA).
[26] Kang G. Shin,et al. Viden: Attacker Identification on In-Vehicle Networks , 2017, CCS.
[27] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[28] Mani Mina,et al. Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.
[29] Gabi Nakibly,et al. Gyrophone: Recognizing Speech from Gyroscope Signals , 2014, USENIX Security Symposium.
[30] Nikhil R. Pal,et al. Genetic programming for simultaneous feature selection and classifier design , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[31] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[32] Radha Poovendran,et al. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks , 2017, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[33] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[34] David Casasent,et al. An improvement on floating search algorithms for feature subset selection , 2009, Pattern Recognit..
[35] Gerhard Rigoll,et al. Selecting Features in On-Line Handwritten Whiteboard Note Recognition: SFS or SFFS? , 2009, 2009 10th International Conference on Document Analysis and Recognition.
[36] Karl Koscher,et al. Exploring Controller Area Networks , 2015, login Usenix Mag..
[37] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[38] Felix C. Freiling,et al. A structured approach to anomaly detection for in-vehicle networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[39] Dong Hoon Lee,et al. Vulnerabilities of Android OS-Based Telematics System , 2017, Wirel. Pers. Commun..
[40] Gert Cauwenberghs,et al. Incremental and Decremental Support Vector Machine Learning , 2000, NIPS.
[41] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[42] Mineichi Kudo,et al. Comparison of algorithms that select features for pattern classifiers , 2000, Pattern Recognit..
[43] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[44] Abraham Kandel,et al. Information-theoretic algorithm for feature selection , 2001, Pattern Recognit. Lett..
[45] Nikita Borisov,et al. Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting , 2015, ArXiv.
[46] Kang G. Shin,et al. Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.