Login / Signup
TACAN: transmitter authentication through covert channels in controller area networks.
Xuhang Ying
Giuseppe Bernieri
Mauro Conti
Radha Poovendran
Published in:
ICCPS (2019)
Keyphrases
</>
network analysis
key players
terrorist networks
social networks
control system
neural network
biometric authentication
controller design
fragile watermarking
control architecture
fuzzy controller
user authentication
image authentication
control method
optimal control
closed loop
social network analysis