, , 2011.
Secure automotive on-board electronics network architecture, FISITA World Automotive Congress, vol.8, 2010. ,
Quotient complexity of closed languages, Computer Science-Theory and Applications, pp.84-95, 2010. ,
This car runs on code, IEEE Spectr, vol.46, issue.3, p.3, 2009. ,
Comprehensive experimental analyses of automotive attack surfaces, Proc. 20th USENIX Security, 2011. ,
Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf. (ESCAR). Düsseldorf, 2009. ,
Securing vehicular on-board it systems: The EVITA project, 25th VDI/VW Automotive Security Conf. Ingolstadt, 2009. ,
Adaptive dynamic reaction to automotive it security incidents using multimedia car environment, Int. Conf. on Information Assurance and Security, pp.295-298, 2008. ,
Secure vehicular communication systems: implementation, performance, and research challenges, Communications Magazine, vol.46, issue.11, pp.110-118, 2008. ,
Security aspects of the in-vehicle network in the connected car, Intelligent Vehicles Symposium (IV), pp.528-533, 2011. ,
Experimental security analysis of a modern automobile, IEEE Symp. Security and Privacy, pp.447-462, 2010. ,
An approach to specification-based attack detection for in-vehicle networks, Intelligent Vehicles Symposium, pp.220-225, 2008. ,
Intrusion detection: A survey, Managing Cyber Threats, Massive Computing, vol.5, pp.19-78, 2005. ,
A method of preventing unauthorized data transmission in controller area network, Vehicular Technology Conf. (VTC Spring), pp.1-5, 2012. ,
Adventures in automotive networks and control units, 2013. ,
A survey of remote automotive attack surfaces, 2014. ,
Entropy-based anomaly detection for invehicle networks, Intelligent Vehicles Symposium (IV), pp.1110-1115, 2011. ,
A structured approach to anomaly detection for in-vehicle networks, 6th Int. Conf. Information Assurance and Security (IAS), pp.92-98, 2010. ,
Simulated attacks on can buses: vehicle virus, Proc. 5th IASTED Int. Conf. on Communication Systems and Networks, pp.66-72, 2008. ,
Xfa: Faster signature matching with extended automata, IEEE Symposium on Security and Privacy, pp.187-201, 2008. ,
Survey on security threats and protection mechanisms in embedded automotive networks, 2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01176042
State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, 2007. ,
State complexity of regular languages, Languages and Combinatorics, vol.6, issue.2, pp.221-234, 2001. ,