Author:
Tangcharoen Chatchawan,Batzorig Munkhdelgerekh,Sahlabadi Mahdi,Prasomphan Sathit,Yim Kangbin
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Kim, M., Oh, I., Yim, K., Sahlabadi, M., Shukur, Z.: Security of 6G-enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies. IEEE Access 12, 33972–34001 (2024)
2. Islam, M.R., Sahlabadi, M., Kim, K., Kim, Y., Yim, K.: CF-AIDS: comprehensive frequency-agnostic intrusion detection system on in-vehicle network. IEEE Access 12, 13971–13985 (2024)
3. Sahlabadi, M., Muniyandi, R.C., Shukur, Z., Islam, M.R., SaberiKamarposhti, M., Yim, K.: LPMSAEF: lightweight process mining-based software architecture evaluation framework for security and performance analysis. Heliyon 10, e26969 (2024)
4. Oladimeji, D., Rasheed, A., Varol, C., Baza, M., Alshahrani, H., Baz, A.: CANAttack: assessing vulnerabilities within controller area network. Sensors 23(19), 8223 (2023)
5. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. BlackHat USA, vol. 2015, no. S91 (2015)