CANAttack: Assessing Vulnerabilities within Controller Area Network.
Damilola OladimejiAmar RasheedCihan VarolMohamed BazaHani AlshahraniAbdullah BazPublished in: Sensors (2023)
Keyphrases
- network model
- peer to peer
- attack graphs
- buffer overflow
- complex networks
- network traffic
- attack graph
- neural network
- real time
- control system
- information security
- communication networks
- network configuration
- optimal control
- artificial neural networks
- network architecture
- network resources
- network monitoring
- security vulnerabilities
- network administrators