-
1Academic Journal
المؤلفون: Andy Berres, Pablo Moriano, Haowen Xu, Sarah Tennille, Lee Smith, Jonathan Storey, Jibonananda Sanyal
المصدر: Data in Brief, Vol 55, Iss , Pp 110675- (2024)
مصطلحات موضوعية: Radar sensor data, Weather conditions, Light conditions, Timeseries, Annotated data, Incident data, Computer applications to medicine. Medical informatics, R858-859.7, Science (General), Q1-390
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
المصدر: PLoS ONE, Vol 19, Iss 1 (2024)
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Jonathan Bryan, Pablo Moriano
المصدر: PLoS ONE, Vol 18, Iss 4 (2023)
وصف الملف: electronic resource
-
4
المؤلفون: Steven Hespeler, Pablo Moriano, Mingyan Li, Sam Hollifield
المساهمون: Pablo Moriano, Mingyan Li, Steven Hespeler
Relation: https://doi.org/10.5281/zenodo.12807316; https://doi.org/10.5281/zenodo.12807317; oai:zenodo.org:12807317
-
5
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
6Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g004
https://figshare.com/articles/figure/HCRL_Car_Hacking_dataset_contains_unintentional_artifacts_of_data_collection_in_particular_in_each_of_the_four_attack_datasets_right_after_conclusion_of_the_attack_there_is_a_prolonged_period_during_which_no_messages_appear_on_the_bus_/25042256 -
7
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
8Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
9
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
10Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g002
https://figshare.com/articles/figure/CAN_data_frame_The_two_primary_components_are_the_Arbitration_ID_used_for_message_identification_and_arbitration_prioritizing_messages_and_the_data_field_containing_up_to_8_bytes_of_message_contents_/25042250 -
11Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g001
https://figshare.com/articles/figure/Papers_published_in_peer_reviewed_journals_based_on_a_yearly_trend_of_CAN_IDS_research_and_b_frequency_of_of_CAN_IDS_category_1_frequency_timing-based_2_payload-based_3_signal-based_4_physical_side-channel_and_5_other_/25042247 -
12Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
-
13Image
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
الاتاحة: https://doi.org/10.1371/journal.pone.0296879.g003
https://figshare.com/articles/figure/The_time_gap_between_subsequent_messages_all_messages_on_the_CAN_capture_of_any_ID_are_included_are_plotted_over_time_during_fuzzing_attacks_on_four_different_vehicles_with_top_three_plots_from_each_vehicle_in_the_HCRL_Survival_Analysis_Dat/25042253 -
14
المؤلفون: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs
مصطلحات موضوعية: Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, suggested use case, simple message injection, requires expensive assets, rapidly growing field, intrusion detection system, id 8217, g ., flooding, corresponding 8220, controller area networks, suspended ones ), id ), suspension, spoofed frames sent, unique advanced attacks, raw 8221, often inappropriate data, first comprehensive guide, datasets 8217, simulated attacks often, facilitate appropriate benchmarking, simulated masquerade attacks, cans including fabrication, comprehensive guide, frames ), masquerade attacks, simulated attacks, method )
Relation: https://figshare.com/articles/dataset/Logs_in_ROAD_CAN_intrusion_detection_dataset_/25042277
-
15
المؤلفون: Yong-Yeol Ahn, Jorge Finke, Pablo Moriano
المصدر: Scientific Reports, Vol 9, Iss 1, Pp 1-9 (2019)
Scientific Reportsمصطلحات موضوعية: 0301 basic medicine, Community based, Multidisciplinary, Computer science, Event (computing), lcsh:R, Community structure, lcsh:Medicine, Models, Theoretical, computer.software_genre, Telecommunications network, Article, Social Networking, 03 medical and health sciences, 030104 developmental biology, 0302 clinical medicine, Humans, lcsh:Q, Data mining, Information cascade, lcsh:Science, computer, Social Media, 030217 neurology & neurosurgery, Algorithms
-
16
المؤلفون: Pablo Moriano Salazar, Kalyan S. Perumalla
مصطلحات موضوعية: Computer science, Robustness (computer science), Control theory, Community structure
-
17
المؤلفون: Soumya Achar, Pablo Moriano, L. Jean Camp
المصدر: Computers & Security. 70:319-334
مصطلحات موضوعية: Leverage (finance), Actuarial science, General Computer Science, Corporate governance, 020206 networking & telecommunications, 02 engineering and technology, Computer security, computer.software_genre, medicine.disease_cause, 03 medical and health sciences, 0302 clinical medicine, 030220 oncology & carcinogenesis, 0202 electrical engineering, electronic engineering, information engineering, Civil Conflict, medicine, Aggregate data, Business, Cluster analysis, Relative deprivation, Law, computer, Competence (human resources), Anecdotal evidence
-
18
المؤلفون: Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp
المصدر: Information & Computer Security. 25:190-205
مصطلحات موضوعية: Information Systems and Management, Knowledge management, Operationalization, Computer Networks and Communications, business.industry, Computer science, End user, 02 engineering and technology, Security information and event management, Management Information Systems, Security engineering, Cognitive dimensions of notations, Information security audit, 020204 information systems, Management of Technology and Innovation, Computer literacy, 0202 electrical engineering, electronic engineering, information engineering, Human-computer interaction in information security, 020201 artificial intelligence & image processing, business, Software, Information Systems
-
19
المؤلفون: Pablo Moriano, Raquel Hill, L. Jean Camp
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Networks and Communications, Computer science, Machine Learning (stat.ML), 02 engineering and technology, Computer security, computer.software_genre, Statistics - Applications, Computer Science - Networking and Internet Architecture, Statistics - Machine Learning, 0202 electrical engineering, electronic engineering, information engineering, Applications (stat.AP), Baseline (configuration management), Networking and Internet Architecture (cs.NI), business.industry, Event (computing), Volume (computing), 020206 networking & telecommunications, Burstiness, Border Gateway Protocol, 020201 artificial intelligence & image processing, The Internet, Anomaly detection, Routing (electronic design automation), business, computer
-
20
المؤلفون: Pablo Moriano, Raquel Hill, L. Jean Camp
مصطلحات موضوعية: Border gateway protocol (BGP), Internet measurements, prefix hijacking, time series analysis, anomaly detection, burstiness
Relation: https://doi.org/10.5281/zenodo.3667718; https://doi.org/10.5281/zenodo.3667719; oai:zenodo.org:3667719