Security Modeling and Analysis on Intra Vehicular Network
暂无分享,去创建一个
Cailian Chen | Haojin Zhu | Lu Zhou | Qingshui Xue | Fan Cheng | Suguo Du | Jinli Zhong
[1] Kang G. Shin,et al. Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.
[2] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[3] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[4] Tong Liu,et al. Strategy for Ensuring In-Vehicle Infotainment Security , 2014 .
[5] Alexandros Asvestopoulos. Intrusion protection of in-vehicle network: study and recommendations , 2015 .
[6] V. Ramaswami. A stable recursion for the steady state vector in markov chains of m/g/1 type , 1988 .
[7] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[8] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.
[9] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[10] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[11] Matthias Korn,et al. Hacking as Transgressive Infrastructuring: Mobile Phone Networks and the German Chaos Computer Club , 2016, CSCW.
[12] Mohd Murtadha Mohamad,et al. A Survey of Security and Privacy in Connected Vehicles , 2015 .