Moldenhauer et al., 2022 - Google Patents
Automotive Ethernet Cyberattack Defense in Ground VehiclesMoldenhauer et al., 2022
- Document ID
- 15907715597176611917
- Author
- Moldenhauer P
- Esquivel J
- Publication year
- Publication venue
- Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium
External Links
- 238000001514 detection method 0 abstract description 24
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20080263661A1 (en) | Detecting anomalies in signaling flows | |
| CN110266650B (en) | Identification method of Conpot industrial control honeypot | |
| EP1712064A1 (en) | Systems and methods for monitoring data transmissions to detect a compromised network | |
| Aiello et al. | Profiling DNS tunneling attacks with PCA and mutual information | |
| Huang et al. | An authentication scheme to defend against UDP DrDoS attacks in 5G networks | |
| Wang et al. | Mining network traffic with the k‐means clustering algorithm for stepping‐stone intrusion detection | |
| CN118300834A (en) | Attack flow generation method and device based on network target range and related equipment | |
| Patel et al. | Internet protocol identification number based ideal stealth port scan detection using snort | |
| Panda et al. | A taxonomy on man-in-the-middle attack in IoT network | |
| Koyama et al. | SOME/IP intrusion detection system using real-time and retroactive anomaly detection | |
| Tanaka et al. | Internet-wide scanner fingerprint identifier based on TCP/IP header | |
| Adenekan | AI-powered threat detection in VoIP networks: A case study on Asterisk | |
| US10182071B2 (en) | Probabilistic tracking of host characteristics | |
| Choi et al. | Implementation and Design of a Zero‐Day Intrusion Detection and Response System for Responding to Network Security Blind Spots | |
| Sukhni et al. | A systematic analysis for botnet detection using genetic algorithm | |
| Rexha et al. | Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms. | |
| Moldenhauer et al. | Automotive Ethernet Cyberattack Defense in Ground Vehicles | |
| Rosell et al. | A frequency-based data mining approach to enhance in-vehicle network intrusion detection | |
| Wang et al. | Detect stepping-stone intrusion by mining network traffic using k-means clustering | |
| US9781158B1 (en) | Integrated paronymous network address detection | |
| Patel et al. | Literature Review of Distributed: Denial of Service Attack Protection | |
| EP3697056B1 (en) | System and method for securing an in-vehicle network | |
| Prabadevi et al. | Lattice structural analysis on sniffing to denial of service attacks | |
| Prieto et al. | Botnet detection based on DNS records and active probing | |
| CN114666129A (en) | Network security authentication method, system, computer equipment, storage medium |