Vulnerability of Controller Area Network to Schedule-Based Attacks.
Sena HounsinouMark StiddUchenna EzeobiHabeeb OlufowobiMitra NasriGedare BloomPublished in: RTSS (2021)
Keyphrases
- buffer overflow
- denial of service
- dos attacks
- traffic analysis
- attack graphs
- peer to peer
- network model
- control system
- real time
- denial of service attacks
- security risks
- intrusion prevention
- network attacks
- network intrusion
- network structure
- security threats
- ddos attacks
- network management
- countermeasures
- control algorithm
- optimal control
- data corruption
- control strategy
- communication networks
- digital images