Author of the publication

Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs.

, , , and . IEEE Trans. Inf. Forensics Secur., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs., , , and . CoRR, (2021)Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline., , and . CoRR, (2022)Using Garbled Circuit for Secure Brokering., and . CRiSIS, volume 13204 of Lecture Notes in Computer Science, page 108-117. Springer, (2021)EPICS: A Framework for Enforcing Security Policies in Composite Web Services., , , and . IEEE Trans. Serv. Comput., 12 (3): 415-428 (2019)Towards extended safety in connected vehicles., , , and . ITSC, page 652-657. IEEE, (2013)A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks., , , , , and . J. Netw. Comput. Appl., (2014)Identification of Dependency-based Attacks on Node.js., and . ARES, page 68:1-68:6. ACM, (2017)Demo: A Low-Cost Fleet Monitoring System., , , , , , and . ISC2, page 1-2. IEEE, (2018)Identification of the Impacts of Code Changes on the Security of Software., , and . COMPSAC (2), page 569-574. IEEE, (2019)Special Issue on Security and Privacy in Smart Cyber-physical Systems., , and . Comput. Secur., (2019)