共 57 条
[2]
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[4]
Cristianini N., 2000, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods
[5]
ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS),
2020,
[6]
Dibaei M, 2019, Arxiv, DOI arXiv:1907.07455
[8]
Dupont Guillaume, 2019, 4TU.ResearchData, V2
[9]
Analyzing the Capabilities of the CAN Attacker
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:464-482