Login / Signup
Covert Channel-Based Transmitter Authentication in Controller Area Networks.
Xuhang Ying
Giuseppe Bernieri
Mauro Conti
Linda Bushnell
Radha Poovendran
Published in:
CoRR (2019)
Keyphrases
</>
covert channel
security requirements
control system
closed loop
social networks
network structure
computer networks
control strategy
neural network
artificial intelligence
access control
network security
control algorithm
network analysis