Comprehensive experimental analyses of automotive attack surfaces ,
Remote exploitation of an unaltered passenger vehicle, 2015. ,
Bro: a system for detecting network intruders in real-time, Computer networks, vol.31, issue.23-24, pp.2435-2463, 1999. ,
Anomaly-based network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009. ,
Anomaly detection: A survey, ACM computing surveys (CSUR), vol.41, issue.3, p.15, 2009. ,
Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010. ,
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, computers & security, vol.31, issue.3, pp.357-374, 2012. ,
Real time emulation of an lte network using ns-3, 2014. ,
Real-time video streaming over ns3-based emulated lte networks, Int. J. Electr. Commun. Comput. Technol.(IJECCT), vol.4, issue.3, 2014. ,
A review of scada anomaly detection systems, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, pp.357-366, 2011. ,
Control variable classification, modeling and anomaly detection in modbus/tcp scada systems, International Journal of Critical Infrastructure Protection, vol.10, pp.59-70, 2015. ,
A translation approach to portable ontology specifications, Knowledge acquisition, vol.5, issue.2, pp.199-220, 1993. ,
Semantics-aware detection of targeted attacks: a survey, Journal of Computer Virology and Hacking Techniques, vol.13, issue.1, pp.47-85, 2017. ,
The ns-3 network simulator," in Modeling and tools for network simulation, pp.15-34, 2010. ,
Beyond throughput: a 4g lte dataset with channel and context metrics, Proceedings of the 9th ACM Multimedia Systems Conference, pp.460-465, 2018. ,