1 |
C. Kim, "A Study on the Standard Development Trend for Automotive Security Threats," Review of KIISC, vol.29, no.1, pp.20-25, 2019.
|
2 |
ISO 21434:2021, "Road vehicles - Cybersecurity engineering," https://www.iso.org/standard/70918.html
|
3 |
ISO 11898-1:2015, "Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signalling," https://www.iso.org/standard/63648.html
|
4 |
S. Jeong, Y. Kim, and S. Lee, "Vehicle ECU Design Incorporating LIN/CAN Vehicle Interface with Kalman Filter Function," J.inst.Korean.electr. elctron.eng., vol.25, no.4, pp.762-765, 2021. DOI: 10.7471/ikeee.2021.25.4.762
DOI
|
5 |
UNECE WP.29, "Proposal for a new UN Regulation on uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system," http://www.unec.org/DAM/trans/doc/2020/wp29grva/ECE-TRANS-WP29-2020-079-Revised.pdf
|
6 |
L. Breiman, "Random Forests," Machine Learning, vol.45, pp.5-32, 2001.
DOI
|
7 |
S. Mehedi, A. Anwar, Z. Rahman, and K. Ahmed, "Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks," Sensors, vol.21, no.14, pp.4736, 2021.
DOI
|
8 |
ISO 15031-1:2010, "Road vehicles - Communication between vehicle and external equipment for emissions-related diagnostics - Part 1: General information and use case definition," https://www.iso.org/standard/51828.html
|
9 |
C. Miller and C. Valasek, "Adventures in Automotive Networks and Control Units," https://ioactive.com/pdfs/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf
|
10 |
H. Park, Self-Studying Machine Learning + Deep Learning, Hanbit Media, 2020.
|
11 |
https://www.python.org
|
12 |
https://scikit-learn.org/stable
|
13 |
https://scikit-learn.org/stable/modules/generated/sklearn.model_selection.GridSearchCV.html
|
14 |
H. Lee, S. Jeong and H. Kim, "OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame," Proceedings of Annual Conference on Privacy, Security and Trust, pp.57-5709, 2017. DOI: 10.1109/PST.2017.00017
DOI
|
15 |
E. Seo, H. Song, and H. Kim, "GIDS: GAN-Based Intrusion Detection System for In-Vehicle Network," Proceedings of Annual Conference on Privacy, Security and Trust, pp.1-6, 2018. DOI: 10.1109/PST.2018.8514157
DOI
|
16 |
H. Song, H. Kim and H. Kim, "Intrusion Detection System-Based on the Analysis of Time Intervals of Messages for In-Vehicle Network," Proceedings of International Conference on Information Networking, pp.63-68, 2016. DOI: 10.1109/ICOIN.2016.7427089
DOI
|
17 |
R. Hamming, "Error detecting and error correcting codes," Bell Labs Technical Journal, vol.29, no.2, pp.147-160, 1960. DOI: 10.1002/j.1538-7305.1950.tb00463.x
DOI
|
18 |
D. Stabil, M. Marchetti, and M. Colajanni, "Detecting Attacks to Internal Vehicle Networks through Hamming Distance," Proceedings of AEIT International Annual Conference, pp.1-6, 2017. DOI: 10.23919/AEIT.2017.8240550
DOI
|
19 |
X. Lin, R. Blanton, and D. Thomas, "Random Forest Architectures on FPGA for Multiple Applications," Proceedings of GLS-VLSI, pp.415-418, 2017. DOI: 10.1145/3060403.3060416
DOI
|