2017 15th Annual Conference on Privacy, Security and Trust (PST) 2017
DOI: 10.1109/pst.2017.00018
|View full text |Cite
|
Sign up to set email alerts
|

A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Moreover, 3 out of 64, 2 out of 64, and 2 out of 64 perform attack analysis, fault analysis, and safety assessment, respectively. Besides, 10 out 64 studies perform distinct functionalities, comprising of Lipeng et al [43], Niamat et al [51], Alexandre et al [55], Sabarathinam et al [56], Mario C et al [58], Elvin et al [64], Subhojeet et al [67], Huai et al [68], Sher et al [91], and TIAN et al [94], holistic event investigation, resilience quantification, cyber impact assessment, root cause analysis, intrusion detection, trust computation, anomaly detection, reliability assessment, software verification, and water traffic management, respectively.…”
Section: Applicability Threat Actor and Implementation Criteriamentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, 3 out of 64, 2 out of 64, and 2 out of 64 perform attack analysis, fault analysis, and safety assessment, respectively. Besides, 10 out 64 studies perform distinct functionalities, comprising of Lipeng et al [43], Niamat et al [51], Alexandre et al [55], Sabarathinam et al [56], Mario C et al [58], Elvin et al [64], Subhojeet et al [67], Huai et al [68], Sher et al [91], and TIAN et al [94], holistic event investigation, resilience quantification, cyber impact assessment, root cause analysis, intrusion detection, trust computation, anomaly detection, reliability assessment, software verification, and water traffic management, respectively.…”
Section: Applicability Threat Actor and Implementation Criteriamentioning
confidence: 99%
“…Mingjing et al [47] Simulation Not Specified Xiaoxue et al [48] Real-time Not Specified Xin et al [49] Real-time Not Specified Meizhi et al [50] Preliminary Not Specified Niamat et al [51] Preliminary Outsider, Insider Chengpeng et al [52] Real-time Not Specified Yi et al [53] Simulation Not Specified Barry et al [54] Preliminary Not Specified Alexandre et al [55] Simulation Outsider Sabarathinam et al [56] Simulation Not Specified Seyedmohsen et al [57] Simulation Not Specified Mario et al [58] Simulation Not Specified Chao et al [59] Preliminary Not Specified Nima et al [60] Real-time Outsider Hui et al [61] Real-time Outsider Xiqiang et al [62] Real-time Not Specified Jamal et al [63] Simulation Not Specified Elvin et al [64] Preliminary Not Specified Xiaoyan et al [65] Real-time Not Specified Ying et al [66] Real-time Outsider Subhojeet et al [67] Simulation Not Specified Huai et al [68] Simulation Not Specified Gabriele et al [69] Preliminary Not Specified Zhiqiang et al [70] Simulation Not Specified Jinsoo et al [71] Real-time Insider Donya et al [72] Preliminary Not Specified Xianyou et al [73] Preliminary Not Specified Galizia et al [74] Simulation Not Specified Francesca et al [75] Simulation Outsider Zhao et al [76] Real-time Not Specified Mark et al [77] Real-time Outsider, Insider Remya et al [78] Simulation Not Specified Xin Chen [79] Simulation Not Specified Mark et al [80] Preliminary Not Specified Martin et al [81] Preliminary Not Specified Jinsoo et al…”
Section: Study Implementation Criteria Threat Actormentioning
confidence: 99%
See 1 more Smart Citation
“…Increasing complexity provides ubiquitous connectivity for autonomous driving and infotainment but comes with opportunities to exploit vulnerabilities in the networks and ECUs [1], [3], [4], [10], [16], [22], [25], [30]. These exploits motivate authentication and intrusion detection systems (IDSs) [17], [19], [21], [24], [26]- [28], [31], [38]- [40] especially in the controller area network (CAN) because it is used in the majority of vehicles.…”
Section: Introductionmentioning
confidence: 99%