Author:
Sun Liqun,Yang Shuqiang,Han Weihong,Wang Haiyan,Chen Yuan
Publisher
Springer Nature Singapore
Reference18 articles.
1. Jo, H.J., Choi, W.: A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures. IEEE Trans. Intell. Transp. Syst. 23(7), 6123–6141 (2022)
2. Woo, S.: Hyo Jin Jo, Dong Hoon Lee, : A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16, 993–1006 (2015)
3. Mahmoud Hashem Eiza and Qiang Ni: Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity. IEEE Veh. Technol. Mag. 12, 45–51 (2017)
4. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015 (2015)
5. S.Nie , L. Liu , Y. Du. : Free-Fall: Hacking Tesla From Wireless to Can Bus. In : Black Hat USA 2017 ( 2017)