-
1Academic Journal
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
المصدر: PLoS ONE, Vol 19, Iss 1 (2024)
وصف الملف: electronic resource
-
2Report
المؤلفون: Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2308.14835
-
3Report
المؤلفون: Blevins, Deborah H., Moriano, Pablo, Bridges, Robert A., Verma, Miki E., Iannacone, Michael D., Hollifield, Samuel C
المصدر: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021
URL الوصول: http://arxiv.org/abs/2101.05781
-
4Report
المؤلفون: Verma, Miki E., Bridges, Robert A., Iannacone, Michael D., Hollifield, Samuel C., Moriano, Pablo, Hespeler, Steven C., Kay, Bill, Combs, Frank L.
المصدر: PLoS one 19, no. 1 (2024): e0296879
URL الوصول: http://arxiv.org/abs/2012.14600
-
5Report
المؤلفون: Bridges, Robert A., Oesch, Sean, Verma, Miki E., Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M.
المصدر: Digital Threats: Research and Practice 2023
URL الوصول: http://arxiv.org/abs/2012.09214
-
6Report
-
7Report
-
8Report
-
9
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
10Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g004
https://figshare.com/articles/figure/HCRL_Car_Hacking_dataset_contains_unintentional_artifacts_of_data_collection_in_particular_in_each_of_the_four_attack_datasets_right_after_conclusion_of_the_attack_there_is_a_prolonged_period_during_which_no_messages_appear_on_the_bus_/25042256 -
11
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
12Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
13
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
14Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g002
https://figshare.com/articles/figure/CAN_data_frame_The_two_primary_components_are_the_Arbitration_ID_used_for_message_identification_and_arbitration_prioritizing_messages_and_the_data_field_containing_up_to_8_bytes_of_message_contents_/25042250 -
15Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g001
https://figshare.com/articles/figure/Papers_published_in_peer_reviewed_journals_based_on_a_yearly_trend_of_CAN_IDS_research_and_b_frequency_of_of_CAN_IDS_category_1_frequency_timing-based_2_payload-based_3_signal-based_4_physical_side-channel_and_5_other_/25042247 -
16Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
17Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g003
https://figshare.com/articles/figure/The_time_gap_between_subsequent_messages_all_messages_on_the_CAN_capture_of_any_ID_are_included_are_plotted_over_time_during_fuzzing_attacks_on_four_different_vehicles_with_top_three_plots_from_each_vehicle_in_the_HCRL_Survival_Analysis_Dat/25042253 -
18
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
Relation: https://figshare.com/articles/dataset/Logs_in_ROAD_CAN_intrusion_detection_dataset_/25042277
-
19Academic Journal
-
20Academic Journal
المؤلفون: Mitsuhiro Matsuda, Jorge Lázaro, Miki Ebisuya
المصدر: Nature Communications, Vol 16, Iss 1, Pp 1-13 (2025)
مصطلحات موضوعية: Science
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2041-1723