共 50 条
[3]
[Anonymous], 2015, Wired
[4]
Bai F, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P329
[5]
Baldini G., 2022, COMPUT COMMUN
[6]
Berger Ivo, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P85, DOI 10.1007/978-3-030-12786-2_6
[7]
Evading Voltage-Based Intrusion Detection on Automotive CAN
[J].
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021),
2021,
[10]
WINDS: A Wavelet-Based Intrusion Detection System for Controller Area Network (CAN)
[J].
IEEE ACCESS,
2021, 9
:58621-58633