Cited By
View all- Tang ZSerag KZonouz SCelik ZXu DBeyah RLuo BLiao XXu JKirda ELie D(2024)ERACAN: Defending Against an Emerging CAN Threat ModelProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690267(1894-1908)Online publication date: 2-Dec-2024
- Kim HChoi WJo H(2024)PE-Detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area NetworksIEEE Transactions on Vehicular Technology10.1109/TVT.2024.343892973:12(19374-19388)Online publication date: Dec-2024
- Agbaje POlufowobi HHounsinou SBloom G(2024)From Weeping to Wailing: A Transitive Stealthy Bus-Off AttackIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.337717925:9(12066-12080)Online publication date: Sep-2024
- Show More Cited By