L. Apvrille, R. Khayari, O. Henniger, Y. Roudier, H. Schweppe et al., Secure automotive on-board electronics network architecture, 2010.

J. Brzozowski, G. Jirásková, and C. Zou, Quotient complexity of closed languages, In: Computer Science?Theory and Applications, pp.84-95, 2010.
DOI : 10.1007/978-3-642-13182-0_8

URL : http://arxiv.org/pdf/0912.1034

R. N. Charette, This car runs on code, IEEE Spectr, vol.46, issue.3, p.3, 2009.

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, Proc. 20th USENIX Security, 2011.

A. Groll, J. Holle, C. Ruland, M. Wolf, T. Wollinger et al., Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf. (ESCAR). Düsseldorf, 2009.

O. Henniger, A. Ruddle, H. Seudié, B. Weyl, M. Wolf et al., Securing vehicular on-board it systems: The EVITA project, 25th VDI/VW Automotive Security Conf. Ingolstadt, 2009.

T. Hoppe, S. Kiltz, and J. Dittmann, Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment, 2008 The Fourth International Conference on Information Assurance and Security, pp.295-298, 2008.
DOI : 10.1109/IAS.2008.45

F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch et al., Secure vehicular communication systems: implementation, performance, and research challenges, IEEE Communications Magazine, vol.46, issue.11, pp.110-118, 2008.
DOI : 10.1109/MCOM.2008.4689253

URL : http://icapeople.epfl.ch/panos/sevecom-comm-mag-2.pdf

P. Kleberger, T. Olovsson, and E. Jonsson, Security aspects of the in-vehicle network in the connected car, 2011 IEEE Intelligent Vehicles Symposium (IV), pp.528-533, 2011.
DOI : 10.1109/IVS.2011.5940525

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

URL : http://www.autosec.org/pubs/cars-oakland2010.pdf

U. E. Larson, D. K. Nilsson, and E. Jonsson, An approach to specification-based attack detection for in-vehicle networks, 2008 IEEE Intelligent Vehicles Symposium, pp.220-225, 2008.
DOI : 10.1109/IVS.2008.4621263

A. Lazarevic, V. Kumar, J. Srivastava, V. Kumar, J. Srivastava et al., Intrusion Detection: A Survey, Managing Cyber Threats, Massive Computing, pp.19-78, 2005.
DOI : 10.1007/0-387-24230-9_2

T. Matsumoto, M. Hata, M. Tanabe, K. Yoshioka, and K. Oishi, A Method of Preventing Unauthorized Data Transmission in Controller Area Network, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), pp.1-5, 2012.
DOI : 10.1109/VETECS.2012.6240294

C. Miller and C. Valasek, Adventures in automotive networks and control units. Last Accessed from h ttp, 2013.

C. Miller and C. Valasek, A survey of remote automotive attack surfaces. Last Accessed from http://illmatics.com/remote attack surfaces, p.pdf, 2014.

M. Muter and N. Asaj, Entropy-based anomaly detection for invehicle networks, Intelligent Vehicles Symposium (IV), pp.1110-1115, 2011.

M. Muter, A. Groll, and F. C. Freiling, A structured approach to anomaly detection for in-vehicle networks, 2010 Sixth International Conference on Information Assurance and Security, pp.92-98, 2010.
DOI : 10.1109/ISIAS.2010.5604050

D. K. Nilsson and U. E. Larson, Simulated attacks on can buses: vehicle virus, Proc. 5th IASTED Int. Conf. on Communication Systems and Networks, pp.66-72, 2008.

R. Smith, C. Estan, and S. Jha, XFA: Faster Signature Matching with Extended Automata, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.187-201, 2008.
DOI : 10.1109/SP.2008.14

I. Studnia, V. Nicomette, E. Alata, Y. Dewarte, M. Kaâniche et al., Survey on security threats and protection mechanisms in embedded automotive networks, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), 2013.
DOI : 10.1109/DSNW.2013.6615528

URL : https://hal.archives-ouvertes.fr/hal-01176042

M. Wolf, A. Weimerskirch, and T. Wollinger, State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, 2007.
DOI : 10.1155/2007/74706

URL : https://doi.org/10.1155/2007/74706

S. Yu, State complexity of regular languages, Journal of Automata , Languages and Combinatorics, vol.6, issue.2, pp.221-234, 2001.