共 30 条
[1]
[Anonymous], 2011, P 20 USENIX SEC S SA
[2]
[Anonymous], OPENDBC COMMAAI
[3]
Error Handling of In-vehicle Networks Makes Them Vulnerable
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1044-1055
[4]
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[7]
Greenberg A., 2015, Wired
[8]
Groza B., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Proceedings of the 11th International Conference, CANS 2012, Darmstadt, Germany, 1214 December 2012, P185, DOI 10.1007/978-3-642-35404-5_15
[9]
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
[J].
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS,
2008, 5219
:235-248
[10]
Keen security lab of tencent, KEEN SECURITY LAB TE