Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. A review.
Wouter HellemansMd Masoom RabbaniBart PreneelNele MentensPublished in: CF (2023)
Keyphrases
- enterprise network
- security issues
- intrusion detection
- network structure
- information security
- access control
- security mechanisms
- literature review
- closed loop
- optimal control
- network analysis
- reverse engineering
- statistical databases
- computer security
- control theory
- controller design
- neural network
- control algorithm
- control method
- computer networks
- heterogeneous networks
- complex networks
- smart grid
- network topologies