共 21 条
[1]
Blazek R.B., 2001, Proceedings of IEEE systems, man and cybernetics information assurance workshop, P220
[2]
Checkoway Stephen., 2011, SEC'11
[3]
Granjon Pierre., 2013, The CuSum Algorithm - A Small Review
[4]
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
[J].
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS,
2008, 5219
:235-248
[5]
Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis
[J].
IEEE SYSTEMS JOURNAL,
2016, 10 (02)
:532-543
[7]
Experimental Security Analysis of a Modern Automobile
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:447-462
[8]
Li CZ, 2008, 2008 42ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-3, P600, DOI 10.1109/CISS.2008.4558595
[10]
Miller C., 2015, ILLMATICS