P. About, , 2011.

L. Apvrille, R. El-khayari, O. Henniger, Y. Roudier, H. Schweppe et al., Secure automotive on-board electronics network architecture, FISITA World Automotive Congress, vol.8, 2010.

J. Brzozowski, G. Jirásková, and C. Zou, Quotient complexity of closed languages, Computer Science-Theory and Applications, pp.84-95, 2010.

R. N. Charette, This car runs on code, IEEE Spectr, vol.46, issue.3, p.3, 2009.

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, Proc. 20th USENIX Security, 2011.

A. Groll, J. Holle, C. Ruland, M. Wolf, T. Wollinger et al., Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf. (ESCAR). Düsseldorf, 2009.

O. Henniger, A. Ruddle, H. Seudié, B. Weyl, M. Wolf et al., Securing vehicular on-board it systems: The EVITA project, 25th VDI/VW Automotive Security Conf. Ingolstadt, 2009.

T. Hoppe, S. Kiltz, and J. Dittmann, Adaptive dynamic reaction to automotive it security incidents using multimedia car environment, Int. Conf. on Information Assurance and Security, pp.295-298, 2008.

F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch et al., Secure vehicular communication systems: implementation, performance, and research challenges, Communications Magazine, vol.46, issue.11, pp.110-118, 2008.

P. Kleberger, T. Olovsson, and E. Jonsson, Security aspects of the in-vehicle network in the connected car, Intelligent Vehicles Symposium (IV), pp.528-533, 2011.

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental security analysis of a modern automobile, IEEE Symp. Security and Privacy, pp.447-462, 2010.

U. E. Larson, D. K. Nilsson, and E. Jonsson, An approach to specification-based attack detection for in-vehicle networks, Intelligent Vehicles Symposium, pp.220-225, 2008.

A. Lazarevic, V. Kumar, and J. Srivastava, Intrusion detection: A survey, Managing Cyber Threats, Massive Computing, vol.5, pp.19-78, 2005.

T. Matsumoto, M. Hata, M. Tanabe, K. Yoshioka, and K. Oishi, A method of preventing unauthorized data transmission in controller area network, Vehicular Technology Conf. (VTC Spring), pp.1-5, 2012.

C. Miller and C. Valasek, Adventures in automotive networks and control units, 2013.

C. Miller and C. Valasek, A survey of remote automotive attack surfaces, 2014.

M. Muter and N. Asaj, Entropy-based anomaly detection for invehicle networks, Intelligent Vehicles Symposium (IV), pp.1110-1115, 2011.

M. Muter, A. Groll, and F. C. Freiling, A structured approach to anomaly detection for in-vehicle networks, 6th Int. Conf. Information Assurance and Security (IAS), pp.92-98, 2010.

D. K. Nilsson and U. E. Larson, Simulated attacks on can buses: vehicle virus, Proc. 5th IASTED Int. Conf. on Communication Systems and Networks, pp.66-72, 2008.

R. Smith, C. Estan, and S. Jha, Xfa: Faster signature matching with extended automata, IEEE Symposium on Security and Privacy, pp.187-201, 2008.

I. Studnia, V. Nicomette, E. Alata, Y. Dewarte, M. Kaâniche et al., Survey on security threats and protection mechanisms in embedded automotive networks, 2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01176042

M. Wolf, A. Weimerskirch, and T. Wollinger, State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, 2007.

S. Yu, State complexity of regular languages, Languages and Combinatorics, vol.6, issue.2, pp.221-234, 2001.