Author of the publication

Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle.

, , , and . BWCCA, volume 570 of Lecture Notes in Networks and Systems, page 137-146. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network., , , , and . IMIS, volume 496 of Lecture Notes in Networks and Systems, page 97-107. Springer, (2022)A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network., , , and . NBiS, volume 183 of Lecture Notes on Data Engineering and Communications Technologies, page 130-141. Springer, (2023)Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle., , , and . BWCCA, volume 570 of Lecture Notes in Networks and Systems, page 137-146. Springer, (2022)In-vehicle Network IDS Using Message Time Interval Infrastructure., , , , and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 111-119. Springer, (2021)SPEC: Frame Filtering for CAN Protocol on ECU., , , , and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 284-293. Springer, (2021)Fuzz Testing and Safe Framework Development for Vehicle Security Analysis., , , , and . IMIS, volume 177 of Lecture Notes on Data Engineering and Communications Technologies, page 103-111. Springer, (2023)