1. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks
2. [ 2 ] Kim , K. , Kim , J. S. , Jeong , S. , Park , J. H. , Kim , H. K. : Cybersecurity for autonomous vehicles: Review of attacks and defense. In : Computers & Security , 102150, pp. 1– 27 ( 2021 ). [2] Kim, K., Kim, J. S., Jeong, S., Park, J. H., Kim, H. K.: Cybersecurity for autonomous vehicles: Review of attacks and defense. In: Computers & Security, 102150, pp. 1–27 (2021).
3. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks
4. [ 4 ] Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. , Shacham , H. , Savage , S. , Koscher , K. , Czeskis , A. , Roesner , F. , Kohno , T. : Comprehensive experimental analyses of automotive attack surfaces . In: USENIX Security Symposium , vol. 4 , no. 447-462, pp. 1 - 16 , ( 2011 ). [4] Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, vol. 4, no. 447-462, pp. 1-16, (2011).
5. [ 5 ] Miller , C. , Valasek , C. : Remote exploitation of an unaltered passenger vehicle. In : Black Hat USA , pp. 91 ( 2015 ). [5] Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA, pp. 91 (2015).