See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
S Checkoway 2011 Comprehensive experimental analyses of automotive attack surfaces USENIX Security Symposium
F Hartwich 2012 CAN with flexible data-rate 13th International CAN Conference (iCC2012) Hambach, Germany
T HoppeS KiltzJ Dittmann 2008 Security threats to automotive CAN networks– practical examples and selected short-term countermeasures Computer Safety, Reliability, and Security Berlin Heidelberg, Germany Springer 235 248
K Koscher 2010 Experimental security analysis of a modern automobile IEEE Symposium Security and Privacy (SP)
P KlebergerT OlovssonE Jonsson 2011 Security aspects of the in-vehicle network in the connected car IEEE Intelligent Vehicles Symposium (IV)
U LarsonD Nilsson 2008 Securing vehicles against cyber attacks Proceedings of the 4th Intelligence Research: Developing Strategies Annual Workshop on Cyber Security and Information to Meet the Cyber Security and Information Intelligence Challenges Ahead ACM
C MillerC Valasek 2013 Adventures in automotive networks and control units Available from http://illmatics. com/car_hacking.pdf
J Pagliery 2014 Your car is a giant computer-and it can be hacked CNN Money. http://money.cnn.com/2014/06/01/technology/se curity/car-hack/index.html?hpt=hp_t1 Accessed 2 June
P. H PhungD. K Nilsson 2010 A model for safe and secure execution of downloaded vehicle applications IET Road Transport Information and Control Conference and the ITS United Kingdom Members’ Conference
SLOA101A 2008 Introduction to the controller area network (CAN) Texas Instruments Dallas, TX
M WolfA WeimerskirchC Paar 2004 Security in automotive bus systems Workshop on Embedded IT-Security in Cars Bochum, Germany