Comprehensive experimental analyses of automotive attack surfaces ,
Fast and vulnerable: A story of telematic failures ,
A car hacking experiment: When connectivity meets vulnerability, Globecom Workshops (GC Wkshps), pp.1-6, 2015. ,
A security analysis of an in-vehicle infotainment and app platform ,
Security crash testpractical security evaluations of automotive onboard it components, Automotive-Safety & Security, 2014. ,
Remote exploitation of an unaltered passenger vehicle, 2015. ,
Bro: a system for detecting network intruders in real-time, Computer networks, vol.31, issue.23-24, pp.2435-2463, 1999. ,
Anomaly-based network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009. ,
Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010. ,
A translation approach to portable ontology specifications, Knowledge acquisition, vol.5, issue.2, pp.199-220, 1993. ,
Semantics-aware detection of targeted attacks: a survey, Journal of Computer Virology and Hacking Techniques, vol.13, issue.1, pp.47-85, 2017. ,
Ontology based application level intrusion detection system by using bayesian filter, Computer, vol.2, pp.1-6, 2009. ,
Modeling computer attacks: An ontology for intrusion detection, International Workshop on Recent Advances in Intrusion Detection, pp.113-135, 2003. ,
Network security situation awareness based on semantic ontology and user-defined rules for internet of things, IEEE Access, vol.5, pp.21-046, 2017. ,
A multi-agents intrusion detection system using ontology and clustering techniques, IFIP International Conference on Computer Science and its Applications, pp.381-393, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01789978
An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies, 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, pp.237-245, 2009. ,
Method ontology for intelligent network forensics analysis, 2010 Eighth International Conference on Privacy, Security and Trust, pp.7-14, 2010. ,
Methontology: from ontological art towards ontological engineering, 1997. ,
Characterization of tor traffic using time based features, ICISSP, pp.253-262, 2017. ,
Osi reference model-the iso model of architecture for open systems interconnection, IEEE Transactions on communications, vol.28, issue.4, pp.425-432, 1980. ,
The vision of autonomic computing, Computer, issue.1, pp.41-50, 2003. ,
An architectural blueprint for autonomic computing, 2006. ,
On intelligence: How a new understanding of the brain will lead to the creation of truly intelligent machines, 2007. ,
Unsupervised real-time anomaly detection for streaming data, Neurocomputing, vol.262, pp.134-147, 2017. ,
Encoding data for htm systems, 2016. ,
Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSP, pp.108-116, 2018. ,
Autobot: An emulation environment for cellular vehicular communications, Proceedings of the 2019 ,
URL : https://hal.archives-ouvertes.fr/hal-02347361
, IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications, 2019.
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, computers & security, vol.31, issue.3, pp.357-374, 2012. ,
Network emulation with netem, pp.18-23, 2005. ,
The connected car-ways to get unauthorized access and potential implications, 2018. ,
Algorithms for hyper-parameter optimization, Advances in neural information processing systems, pp.2546-2554, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00642998