1 |
B. Mukherjee, L. T. Heberlein & K. N. Levitt. (1994). Network intrusion detection. IEEE network, 8(3), 26-41.
DOI
|
2 |
P. Garcia-Teodoro, J. Diaz-Verdejo. G. Macia-Fernandez & E. Vazquez. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1-2), 18-28.
DOI
|
3 |
E. M. Yang, H. J. Lee & C. H. Seo. (2017). Comparison of Detection Performance of Intrusion Detection System Using Fuzzy and Artificial Neural Network. Journal of Digital Convergence, 15(6), 391-398.
DOI
|
4 |
Vehicle anomaly detection tutorial, Information protection R&D data challenge.
|
5 |
D. H. Choi & J. H. Park. (2015). Security tendency analysis techniques through machine learning algorithms applications in big data environments. Journal of Digital Convergence, 13(9), 269-276.
DOI
|
6 |
M. S. Han & W. S. Bae. (2014). Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, 12(8), 229-234.
DOI
|
7 |
S. J. Lee & W. S. Bae. (2015). Inter-device Mutual Authentication and Formal Verification in Vehicular Security System. Journal of Digital Convergence, 13(4), 205-210.
DOI
|
8 |
S. J. Lee & W. S. Bae. (2015). Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication. Journal of Digital Convergence, 13(9), 297-302.
DOI
|
9 |
L. Portnoy, E. Eskin & S. Stolfo. (2001). Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001.
|
10 |
CAN intrusion dataset. http://ocslab.hksecurity.net/Datasets/CAN-intrusion-dataset
|
11 |
L. M. Manevitz & M. Yousef. (2001). One-class SVMs for document classification. Journal of machine Learning research, 2(Dec), 139-154.
|
12 |
H. S. Lee, S. H. Jeong & Huy Kang Kim. (2017). OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame, PST (Privacy, Security and Trust).
|
13 |
H. M. Song, H. R. Kim & Huy Kang Kim. (2016). Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network, In Information Networking (ICOIN), 2016 International Conference on. IEEE. 63-68.
|
14 |
S. Woo, H. J. Jo & D. H. Lee. (2015). A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation Systems, 16(2), 993-1006.
DOI
|
15 |
WEKA, https://www.cs.waikato.ac.nz/ml/weka/
|
16 |
C. C. Chang & C. J. Lin. (2011). LIBSVM: a library for support vector machines. ACM transactions on intelligent systems and technology (TIST), 2(3), 27.
|
17 |
D. E. Goldberg & J. H. Holland. (1988). Genetic algorithms and machine learning. Machine learning, 3(2), 95-99.
DOI
|
18 |
F. Glover. (1989). Tabu search-part I. ORSA Journal on computing, 1(3), 190-206.
DOI
|
19 |
Metaheuristic, https://en.wikipedia.org/wiki/Metaheuristic
|
20 |
P. J. Van Laarhoven & E. H. Aarts. (1987). Simulated annealing. In Simulated annealing: Theory and applications. Springer, Dordrecht, 7-15.
|