4.7 Article

Automatic whitelist generation system for ethernet based in-vehicle network

Related references

Note: Only part of the references are listed.
Article Computer Science, Interdisciplinary Applications

Detecting cyberattacks using anomaly detection in industrial control systems: A Federated Learning approach

Truong Thu Huong et al.

Summary: This research proposes a method for detecting network attacks in industrial control systems using anomaly detection, which achieves higher detection performance for time series data using a Federated Learning architecture deployed on edge computing hardware of IIoT smart manufacturing.

COMPUTERS IN INDUSTRY (2021)

Article Computer Science, Interdisciplinary Applications

Preventive maintenance for heterogeneous industrial vehicles with incomplete usage data

Dena Markudova et al.

Summary: This paper examines an industrial case study on scheduling maintenance operations of a large fleet of construction vehicles, using data-driven solutions based on machine learning techniques. It shows that machine learning models can effectively predict maintenance needs even for vehicles with limited historical data, by identifying similar usage trends from other vehicles in the fleet.

COMPUTERS IN INDUSTRY (2021)

Article Computer Science, Interdisciplinary Applications

A general optimization-based approach to the detection of real-time Ethernet traffic events

Guilherme Serpa Sestito et al.

Summary: Industrial Ethernet is widely used in industrial automation, but its vulnerabilities have sparked discussions. This study proposes a general and accurate anomaly detection technique for any protocol based on RTE, utilizing various ANN-based and SVM-based classifiers to improve accuracy.

COMPUTERS IN INDUSTRY (2021)

Article Engineering, Electrical & Electronic

An Architecture for In-Vehicle Networks

Jean Walrand et al.

Summary: As vehicles become equipped with more complex sensors and processors, the communication requirements become more demanding. This paper introduces an Ethernet-based architecture with provable guaranteed performance and simple configuration, suitable for supporting the communication needs of in-vehicle networks.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

A Survey on Industrial Control System Testbeds and Datasets for Security Research

Mauro Conti et al.

Summary: The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) have exposed them to new vulnerability surfaces, leading to a focus on developing new security mechanisms like Intrusion Detection Systems (IDSs) using modern machine learning techniques. Academia, Industry, and Government are proposing testbeds and datasets for testing the performance of these IDSs, as well as cross-validating security systems in critical infrastructures and manufacturing industries. The research in this field aims to establish a baseline for the state of the art in IDS algorithms.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems

Shehzad Ashraf Chaudhry et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Interdisciplinary Applications

Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts

Angelo Corallo et al.

COMPUTERS IN INDUSTRY (2020)

Article Computer Science, Information Systems

Toward Automated Vehicle Teleoperation: Vision, Opportunities, and Challenges

Tao Zhang

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

In-Vehicle Networking: Protocols, Challenges, and Solutions

Jun Huang et al.

IEEE NETWORK (2019)

Article Computer Science, Interdisciplinary Applications

5G network slicing strategies for a smart factory

Jaspreet Singh Walia et al.

COMPUTERS IN INDUSTRY (2019)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Automation & Control Systems

Design Optimization of Frame Preemption in Real-Time Switched Ethernet

Taeju Park et al.

2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) (2019)

Article Computer Science, Hardware & Architecture

An improved and robust biometrics-based three factor authentication scheme for multiserver environments

Shehzad Ashraf Chaudhry et al.

JOURNAL OF SUPERCOMPUTING (2018)

Review Computer Science, Interdisciplinary Applications

Cybersecurity for Industry 4.0 in the current literature: A reference framework

Marianna Lezzi et al.

COMPUTERS IN INDUSTRY (2018)

Proceedings Paper Computer Science, Theory & Methods

Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks

Marcel Kneib et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Information Systems

Viden: Attacker Identification on In-Vehicle Networks

Kyong-Tak Cho et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Hardware & Architecture

A lightweight message authentication scheme for Smart Grid communications in power sector

Khalid Mahmood et al.

COMPUTERS & ELECTRICAL ENGINEERING (2016)

Article Computer Science, Theory & Methods

Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture

Hyunguk Yoo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Multidisciplinary Sciences

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

Min-Joo Kang et al.

PLOS ONE (2016)

Article Computer Science, Theory & Methods

From Security to Assurance in the Cloud: A Survey

Claudio A. Ardagna et al.

ACM COMPUTING SURVEYS (2015)

Article Engineering, Electrical & Electronic

Gateway Framework for In-Vehicle Networks Based on CAN, FlexRay, and Ethernet

Jin Ho Kim et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Article Computer Science, Theory & Methods

Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised

Robert I. Davis et al.

REAL-TIME SYSTEMS (2007)