S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, 2015.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer networks, vol.31, issue.23-24, pp.2435-2463, 1999.

P. Garcia-teodoro, J. Diaz-verdejo, G. Maciá-fernández, and E. Vázquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection: A survey, ACM computing surveys (CSUR), vol.41, issue.3, p.15, 2009.

R. Sommer and V. Paxson, Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, computers & security, vol.31, issue.3, pp.357-374, 2012.

T. Molloy, Z. Yuan, and G. Muntean, Real time emulation of an lte network using ns-3, 2014.

A. Fouda, A. N. Ragab, A. Esswie, M. Marzban, A. Naser et al., Real-time video streaming over ns3-based emulated lte networks, Int. J. Electr. Commun. Comput. Technol.(IJECCT), vol.4, issue.3, 2014.

I. Garitano, R. Uribeetxeberria, and U. Zurutuza, A review of scada anomaly detection systems, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, pp.357-366, 2011.

N. Erez and A. Wool, Control variable classification, modeling and anomaly detection in modbus/tcp scada systems, International Journal of Critical Infrastructure Protection, vol.10, pp.59-70, 2015.

T. R. Gruber, A translation approach to portable ontology specifications, Knowledge acquisition, vol.5, issue.2, pp.199-220, 1993.

R. Luh, S. Marschalek, M. Kaiser, H. Janicke, and S. Schrittwieser, Semantics-aware detection of targeted attacks: a survey, Journal of Computer Virology and Hacking Techniques, vol.13, issue.1, pp.47-85, 2017.

G. F. Riley and T. R. Henderson, The ns-3 network simulator," in Modeling and tools for network simulation, pp.15-34, 2010.

D. Raca, J. J. Quinlan, A. H. Zahran, and C. J. Sreenan, Beyond throughput: a 4g lte dataset with channel and context metrics, Proceedings of the 9th ACM Multimedia Systems Conference, pp.460-465, 2018.