Mitigating voltage fingerprint spoofing attacks on the controller area network bus.
Wassila LalouaniYi DangMohamed YounisPublished in: Clust. Comput. (2023)
Keyphrases
- traffic analysis
- real time
- liveness detection
- network traffic
- cyber attacks
- control system
- wireless sensor networks
- network anomaly detection
- neural network
- networked control systems
- denial of service attacks
- countermeasures
- control algorithm
- communication networks
- fuzzy controller
- iris recognition
- control scheme
- operating conditions
- ddos attacks
- fingerprint recognition
- computer networks
- power system
- network intrusion
- network attacks
- peer to peer
- buffer overflow
- high speed