CANAttack: Assessing Vulnerabilities within Controller Area Network
Current vehicles include electronic features that provide ease and convenience to drivers.
These electronic features or nodes rely on in-vehicle communication protocols to ensure …
These electronic features or nodes rely on in-vehicle communication protocols to ensure …
Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity
P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …
transformed various aspects of daily life. The proliferation of indispensable objects such as …
Decentralized switching-type adaptive event-triggered-based non-recursive control for interconnected cyber-physical systems against multiple cyber attacks
H Sun, Y Cui, L Hou, T Jiao - IEEE Transactions on Industrial …, 2024 - ieeexplore.ieee.org
This study addresses a decentralized switching-type adaptive event-triggered-based non-
recursive security controller design for interconnected cyber-physical systems under multiple …
recursive security controller design for interconnected cyber-physical systems under multiple …
Nussbaum-Based Adaptive Neural Networks Tracking Control for Nonlinear PDE-ODE Systems Subject to Deception Attacks
L Wan, H Zhang, J Sun, Z Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this article, the novel adaptive neural networks (NNs) tracking control scheme is
presented for nonlinear partial differential equation (PDE)-ordinary differential equation …
presented for nonlinear partial differential equation (PDE)-ordinary differential equation …
Using authenticated encryption for securing controller area networks in autonomous mobile platforms
Controller Area Networks (CAN) has become the dominant data communication and
networking system used in today's smart vehicles, autonomous mobile platforms, and …
networking system used in today's smart vehicles, autonomous mobile platforms, and …
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol
The convenience behind modern intelligent vehicles is simply that a group of intelligent
electronic control units (ECUs) connected to controller area network (CAN) work in concert …
electronic control units (ECUs) connected to controller area network (CAN) work in concert …
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning
Embedded system technologies are increasingly being incorporated into manufacturing,
smart grid, industrial control systems, and transportation systems. However, the vast majority …
smart grid, industrial control systems, and transportation systems. However, the vast majority …
Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks
This paper considers the security of cyber-physical systems (CPSs) subject to replay attacks
with measurements of the sensor transmitted to the remote estimator over a wireless …
with measurements of the sensor transmitted to the remote estimator over a wireless …
IoT based Real Time Anomaly Detection in Automotive ECUs Using Machine Learning
R Biswas, PK Samanta, A Bakshi… - … on Recent Advances …, 2024 - ieeexplore.ieee.org
Electronic control units (ECU s) play a vital role in modern vehicles, but their increased use
opens vehicles to cyber-attacks that threaten safety and privacy. This research proposes a …
opens vehicles to cyber-attacks that threaten safety and privacy. This research proposes a …
Location Privacy Protection in Vehicular Networks
B Ma - 2023 - opus.lib.uts.edu.au
Location privacy is of utmost importance in vehicular networks, where drivers' trajectories
and personal information can be exposed, posing threats to drivers' safety and personal …
and personal information can be exposed, posing threats to drivers' safety and personal …