Secure automotive on-board electronics network architecture, 2010. ,
Quotient complexity of closed languages, In: Computer Science?Theory and Applications, pp.84-95, 2010. ,
DOI : 10.1007/978-3-642-13182-0_8
URL : http://arxiv.org/pdf/0912.1034
This car runs on code, IEEE Spectr, vol.46, issue.3, p.3, 2009. ,
Comprehensive experimental analyses of automotive attack surfaces, Proc. 20th USENIX Security, 2011. ,
Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf. (ESCAR). Düsseldorf, 2009. ,
Securing vehicular on-board it systems: The EVITA project, 25th VDI/VW Automotive Security Conf. Ingolstadt, 2009. ,
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment, 2008 The Fourth International Conference on Information Assurance and Security, pp.295-298, 2008. ,
DOI : 10.1109/IAS.2008.45
Secure vehicular communication systems: implementation, performance, and research challenges, IEEE Communications Magazine, vol.46, issue.11, pp.110-118, 2008. ,
DOI : 10.1109/MCOM.2008.4689253
URL : http://icapeople.epfl.ch/panos/sevecom-comm-mag-2.pdf
Security aspects of the in-vehicle network in the connected car, 2011 IEEE Intelligent Vehicles Symposium (IV), pp.528-533, 2011. ,
DOI : 10.1109/IVS.2011.5940525
Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010. ,
DOI : 10.1109/SP.2010.34
URL : http://www.autosec.org/pubs/cars-oakland2010.pdf
An approach to specification-based attack detection for in-vehicle networks, 2008 IEEE Intelligent Vehicles Symposium, pp.220-225, 2008. ,
DOI : 10.1109/IVS.2008.4621263
Intrusion Detection: A Survey, Managing Cyber Threats, Massive Computing, pp.19-78, 2005. ,
DOI : 10.1007/0-387-24230-9_2
A Method of Preventing Unauthorized Data Transmission in Controller Area Network, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), pp.1-5, 2012. ,
DOI : 10.1109/VETECS.2012.6240294
Adventures in automotive networks and control units. Last Accessed from h ttp, 2013. ,
A survey of remote automotive attack surfaces. Last Accessed from http://illmatics.com/remote attack surfaces, p.pdf, 2014. ,
Entropy-based anomaly detection for invehicle networks, Intelligent Vehicles Symposium (IV), pp.1110-1115, 2011. ,
A structured approach to anomaly detection for in-vehicle networks, 2010 Sixth International Conference on Information Assurance and Security, pp.92-98, 2010. ,
DOI : 10.1109/ISIAS.2010.5604050
Simulated attacks on can buses: vehicle virus, Proc. 5th IASTED Int. Conf. on Communication Systems and Networks, pp.66-72, 2008. ,
XFA: Faster Signature Matching with Extended Automata, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.187-201, 2008. ,
DOI : 10.1109/SP.2008.14
Survey on security threats and protection mechanisms in embedded automotive networks, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), 2013. ,
DOI : 10.1109/DSNW.2013.6615528
URL : https://hal.archives-ouvertes.fr/hal-01176042
State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, 2007. ,
DOI : 10.1155/2007/74706
URL : https://doi.org/10.1155/2007/74706
State complexity of regular languages, Journal of Automata , Languages and Combinatorics, vol.6, issue.2, pp.221-234, 2001. ,