Evading Voltage-Based Intrusion Detection on Automotive CAN. Bhatia, R., Kumar, V., Serag, K., Celik, Z. B., Payer, M., & Xu, D. In Network and Distributed System Security Symposium (NDSS), pages 1-17, 2021. Paper bibtex @InProceedings{Berkay2021DuetNDSS,
author = {Bhatia, Rohit and Kumar, Vireshwar and Serag, Khaled and Celik, Z. Berkay and Payer, Mathias and Xu, Dongyan},
booktitle = {Network and Distributed System Security Symposium (NDSS)},
title = {{Evading Voltage-Based Intrusion Detection on Automotive CAN}},
pages = {1-17},
comment = {Acceptance Rate: 15.2\%)},
year = {2021},
owner = {berkay},
url = {https://beerkay.github.io/papers/Berkay2021DuetNDSS.pdf}
}
Downloads: 0
{"_id":"gGDG2Yxv7w3Lby9tG","bibbaseid":"bhatia-kumar-serag-celik-payer-xu-evadingvoltagebasedintrusiondetectiononautomotivecan-2021","authorIDs":["uN77HDSE86zvjth5x"],"author_short":["Bhatia, R.","Kumar, V.","Serag, K.","Celik, Z. B.","Payer, M.","Xu, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Bhatia"],"firstnames":["Rohit"],"suffixes":[]},{"propositions":[],"lastnames":["Kumar"],"firstnames":["Vireshwar"],"suffixes":[]},{"propositions":[],"lastnames":["Serag"],"firstnames":["Khaled"],"suffixes":[]},{"propositions":[],"lastnames":["Celik"],"firstnames":["Z.","Berkay"],"suffixes":[]},{"propositions":[],"lastnames":["Payer"],"firstnames":["Mathias"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Dongyan"],"suffixes":[]}],"booktitle":"Network and Distributed System Security Symposium (NDSS)","title":"Evading Voltage-Based Intrusion Detection on Automotive CAN","pages":"1-17","comment":"Acceptance Rate: 15.2%)","year":"2021","owner":"berkay","url":"https://beerkay.github.io/papers/Berkay2021DuetNDSS.pdf","bibtex":"@InProceedings{Berkay2021DuetNDSS,\n author = {Bhatia, Rohit and Kumar, Vireshwar and Serag, Khaled and Celik, Z. Berkay and Payer, Mathias and Xu, Dongyan},\n booktitle = {Network and Distributed System Security Symposium (NDSS)},\n title = {{Evading Voltage-Based Intrusion Detection on Automotive CAN}},\n pages = {1-17},\n comment = {Acceptance Rate: 15.2\\%)},\n year = {2021},\n owner = {berkay},\n url = {https://beerkay.github.io/papers/Berkay2021DuetNDSS.pdf}\n}\n\n","author_short":["Bhatia, R.","Kumar, V.","Serag, K.","Celik, Z. B.","Payer, M.","Xu, D."],"key":"Berkay2021DuetNDSS","id":"Berkay2021DuetNDSS","bibbaseid":"bhatia-kumar-serag-celik-payer-xu-evadingvoltagebasedintrusiondetectiononautomotivecan-2021","role":"author","urls":{"Paper":"https://beerkay.github.io/papers/Berkay2021DuetNDSS.pdf"},"metadata":{"authorlinks":{"celik, z":"https://beerkay.github.io/fullpublication/"}}},"bibtype":"inproceedings","biburl":"https://beerkay.github.io/papers/myPublications.bib","creationDate":"2021-01-27T07:58:48.210Z","downloads":7,"keywords":[],"search_terms":["evading","voltage","based","intrusion","detection","automotive","bhatia","kumar","serag","celik","payer","xu"],"title":"Evading Voltage-Based Intrusion Detection on Automotive CAN","year":2021,"dataSources":["pzatXK8Qzi4taQTqY","Z6kChNLF2NcgPrzyg","bc73Eqox2pPuwmAyT","zKytcgTsdu3euRBgS","QZu7oZrNHQ6m88cDC"]}