共 24 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[3]
CAN Specification, 1991, ROBERT BOSCH GMBH PO, V50
[4]
Charette R.N., 2021, SOFTWARE IS EATING C
[5]
Viden: Attacker Identification on In-Vehicle Networks
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1109-1123
[6]
Desta Araya Kibrom, 2022, VEH COMMUN
[7]
<< I Know Where You Parked Last Summer >> Automated Reverse Engineering and Privacy Analysis of Modern Cars
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1401-1415
[8]
Analyzing the Capabilities of the CAN Attacker
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:464-482
[9]
A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment
[J].
INTERNET OF VEHICLES - SAFE AND INTELLIGENT MOBILITY, IOV 2015,
2015, 9502
:89-97