Reverse Engineering Controller Area Network Messages Using Unsupervised Machine Learning
暂无分享,去创建一个
Gedare Bloom | Joseph Zambreno | Habeeb Olufowobi | Clinton Young | Uchenna Ezeobi | J. Zambreno | Gedare Bloom | Uchenna Ezeobi | Habeeb Olufowobi | C. Young
[1] Biplab Sikdar,et al. Consumer IoT: Security Vulnerability Case Studies and Solutions , 2020, IEEE Consumer Electronics Magazine.
[2] Gedare Bloom,et al. Survey of Automotive Controller Area Network Intrusion Detection Systems , 2019, IEEE Design & Test.
[3] Andrei Novikov,et al. PyClustering: Data Mining Library , 2019, J. Open Source Softw..
[4] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[5] Kang G. Shin,et al. LibreCAN: Automated CAN Message Translator , 2019, CCS.
[6] Haibo Zeng,et al. Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice , 2012 .
[7] C. Mallows,et al. A Method for Comparing Two Hierarchical Clusterings , 1983 .
[8] Michael D. Iannacone,et al. CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data , 2021, IEEE Transactions on Vehicular Technology.
[9] Gedare Bloom,et al. SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing , 2020, IEEE Transactions on Vehicular Technology.
[10] Robert A. Bridges,et al. ACTT: Automotive CAN Tokenization and Translation , 2018, 2018 International Conference on Computational Science and Computational Intelligence (CSCI).
[11] Mirco Marchetti,et al. READ: Reverse Engineering of Automotive Data Frames , 2003, IEEE Transactions on Information Forensics and Security.