Survey of Automotive Controller Area Network Intrusion Detection Systems
暂无分享,去创建一个
Gedare Bloom | Joseph Zambreno | Habeeb Olufowobi | Clinton Young | J. Zambreno | Gedare Bloom | Habeeb Olufowobi | C. Young
[1] Avishai Wool,et al. Field classification, modeling and anomaly detection in unknown CAN bus networks , 2017, Veh. Commun..
[2] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[3] Tasuku Ishigooka,et al. CAN Security: Cost-Effective Intrusion Detection for Real-Time Control Systems , 2014 .
[4] D.K. Nilsson,et al. An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[5] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[6] Ahmad-Reza Sadeghi,et al. EDA for secure and dependable cybercars: Challenges and opportunities , 2012, DAC Design Automation Conference 2012.
[7] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[8] Karthik Pattabiraman,et al. Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems , 2015, 2015 11th European Dependable Computing Conference (EDCC).
[9] Dong Hoon Lee,et al. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System , 2018, IEEE Transactions on Information Forensics and Security.
[10] Felix C. Freiling,et al. A structured approach to anomaly detection for in-vehicle networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[11] Frank Mueller,et al. Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.
[12] Kazuomi Oishi,et al. A Method of Preventing Unauthorized Data Transmission in Controller Area Network , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[13] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[14] Martin Lukasiewycz,et al. Lightweight authentication for secure automotive networks , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[15] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[16] Huy Kang Kim,et al. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).
[17] Stacy J. Prowell,et al. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection , 2017, CISRC.
[18] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[19] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[20] Lui Sha,et al. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems , 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS).
[21] Michele Colajanni,et al. Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms , 2016, 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI).
[22] Luca Fanucci,et al. An implementation of the 802.1AE MAC Security Standard for in-car networks , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[23] Priyadarsi Nanda,et al. Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] , 2017, IEEE Consumer Electronics Magazine.
[24] Hafedh Trabelsi,et al. An intrusion detection method for securing in-vehicle CAN bus , 2016, 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA).
[25] Alberto L. Sangiovanni-Vincentelli,et al. Cyber-Security for the Controller Area Network (CAN) Communication Protocol , 2012, 2012 International Conference on Cyber Security.
[26] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[27] Xinkai Wu,et al. Investigating the Effects of Attack Detection for In-Vehicle Networks Based on Clock Drift of ECUs , 2018, IEEE Access.