Publisher
Springer Berlin Heidelberg
Reference97 articles.
1. Ying X, Bernieri G, Conti M, Poovendran R (2019) TACAN: transmitter authentication through covert channels in controller area networks. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, ICCPS 2019, April 16–18, 2019. Montreal, QC, S 23–34
2. Groza B, Popa L, Murvay PS (2021) Canto-covert authentication with timing channels over optimized traffic flows for can. IEEE Trans Inf Foren Secur 16:601–616. https://doi.org/10.1109/TIFS.2020.3017892
3. Groza B, Popa L, Murvay PS (2019) INCANTA-intrusion detection in controller area networks with time-covert authentication. Security and Safety Interplay of Intelligent Software Systems. Springer International Publishing, Cham, S 94–110
4. Hegde R, Kumar S, Gurumurthy K (2013) The impact of network topologies on the performance of the in-vehicle network. Int J Comput Theory Eng 5(3):405
5. Moritz R, Ulrich T, Thiele L (2012) Evolutionary exploration of e/e-architectures in automotive design. In: Operations research proceedings 2011. Springer, Berlin, S 361–366