共 18 条
[2]
[Anonymous], **DATA OBJECT**, DOI DOI 10.5281/ZENODO.3267184
[3]
[Anonymous], 2013, SPOOFERS USE FAKE GP
[5]
Cardenas R, 2011, EUR CONF POW ELECTR
[6]
Dusparic I, 2015, 2015 IEEE FIRST INTERNATIONAL SMART CITIES CONFERENCE (ISC2)
[7]
Ganesan Arun., 2017, Exploiting Consistency Among Heterogeneous Sensors for Vehicle Anomaly Detection
[8]
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
[J].
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS,
2008, 5219
:235-248
[10]
Cyber-Physical System Checkpointing and Recovery
[J].
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018),
2018,
:22-31