S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces

I. D. Foster, A. Prudhomme, K. Koscher, and S. Savage, Fast and vulnerable: A story of telematic failures

S. Jafarnejad, L. Codeca, W. Bronzi, R. Frank, and T. Engel, A car hacking experiment: When connectivity meets vulnerability, Globecom Workshops (GC Wkshps), pp.1-6, 2015.

S. Mazloom, M. Rezaeirad, A. Hunter, and D. Mccoy, A security analysis of an in-vehicle infotainment and app platform

S. Bayer, T. Enderle, D. Oka, and M. Wolf, Security crash testpractical security evaluations of automotive onboard it components, Automotive-Safety & Security, 2014.

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, 2015.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer networks, vol.31, issue.23-24, pp.2435-2463, 1999.

P. Garcia-teodoro, J. Diaz-verdejo, G. Maciá-fernández, and E. Vázquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009.

R. Sommer and V. Paxson, Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010.

T. R. Gruber, A translation approach to portable ontology specifications, Knowledge acquisition, vol.5, issue.2, pp.199-220, 1993.

R. Luh, S. Marschalek, M. Kaiser, H. Janicke, and S. Schrittwieser, Semantics-aware detection of targeted attacks: a survey, Journal of Computer Virology and Hacking Techniques, vol.13, issue.1, pp.47-85, 2017.

A. Razzaq, H. F. Ahmed, A. Hur, and N. Haider, Ontology based application level intrusion detection system by using bayesian filter, Computer, vol.2, pp.1-6, 2009.

J. Undercoffer, A. Joshi, and J. Pinkston, Modeling computer attacks: An ontology for intrusion detection, International Workshop on Recent Advances in Intrusion Detection, pp.113-135, 2003.

G. Xu, Y. Cao, Y. Ren, X. Li, and Z. Feng, Network security situation awareness based on semantic ontology and user-defined rules for internet of things, IEEE Access, vol.5, pp.21-046, 2017.

I. Brahmi, H. Brahmi, and S. B. Yahia, A multi-agents intrusion detection system using ontology and clustering techniques, IFIP International Conference on Computer Science and its Applications, pp.381-393, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01789978

G. A. Isaza, A. G. Castillo, and N. D. Duque, An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies, 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, pp.237-245, 2009.

S. Saad and I. Traore, Method ontology for intelligent network forensics analysis, 2010 Eighth International Conference on Privacy, Security and Trust, pp.7-14, 2010.

M. Fernández-lópez, A. Gómez-pérez, and N. Juristo, Methontology: from ontological art towards ontological engineering, 1997.

A. H. Lashkari, G. Draper-gil, M. S. Mamun, and A. A. Ghorbani, Characterization of tor traffic using time based features, ICISSP, pp.253-262, 2017.

H. Zimmermann, Osi reference model-the iso model of architecture for open systems interconnection, IEEE Transactions on communications, vol.28, issue.4, pp.425-432, 1980.

J. O. Kephart and D. M. Chess, The vision of autonomic computing, Computer, issue.1, pp.41-50, 2003.

A. Computing, An architectural blueprint for autonomic computing, 2006.

J. Hawkins and S. Blakeslee, On intelligence: How a new understanding of the brain will lead to the creation of truly intelligent machines, 2007.

S. Ahmad, A. Lavin, S. Purdy, and Z. Agha, Unsupervised real-time anomaly detection for streaming data, Neurocomputing, vol.262, pp.134-147, 2017.

S. Purdy, Encoding data for htm systems, 2016.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSP, pp.108-116, 2018.

Q. Ricard and P. Owezarski, Autobot: An emulation environment for cellular vehicular communications, Proceedings of the 2019
URL : https://hal.archives-ouvertes.fr/hal-02347361

, IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications, 2019.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, computers & security, vol.31, issue.3, pp.357-374, 2012.

S. Hemminger, Network emulation with netem, pp.18-23, 2005.

. Computest, The connected car-ways to get unauthorized access and potential implications, 2018.

J. S. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl, Algorithms for hyper-parameter optimization, Advances in neural information processing systems, pp.2546-2554, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00642998