CAN bus risk analysis revisit
In automotive design process, safety has always been the main concern. However, in modern days, security is also seen as an important aspect in vehicle communication especially where connectivity is very widely available. In this paper, we are going to discuss the threats and vulnerabilities of a CA...
| Main Authors: | Mansor, Hafizah, Markantonakis, Konstantinos, Mayes, Keith |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
Springer
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/73566/ http://irep.iium.edu.my/73566/7/73566%20CAN%20Bus%20Risk%20Analysis%20Revisit.pdf |
Similar Items
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
Spectrum analysis of physiological signals of human activities
by: Kazmi, Syed Absar, et al.
Published: (2015)
by: Kazmi, Syed Absar, et al.
Published: (2015)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Polarity Classification Tool for Sentiment Analysis in Malay Language
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2019)
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2019)
The system architecture of E-braille by using the microcontroller and external controller unit
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
Dynamic spectrum allocation scheme for heterogeneous network: BER analysis
by: Othman, Nurzati Iwani, et al.
Published: (2017)
by: Othman, Nurzati Iwani, et al.
Published: (2017)
Performance analysis of machine learning algorithms for missing value imputation
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
Poincare based PPG signal analysis for varying physiological states
by: Kazmi , Syed Absar, et al.
Published: (2016)
by: Kazmi , Syed Absar, et al.
Published: (2016)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Detecting changes in context using time series analysis of social network
by: Nusratullah , Kajal, et al.
Published: (2015)
by: Nusratullah , Kajal, et al.
Published: (2015)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Forensic analysis of offline signature using multi-layer perception and random forest
by: Shah, Abdul Salam, et al.
Published: (2017)
by: Shah, Abdul Salam, et al.
Published: (2017)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network
by: Yalli, Jameel Shehu, et al.
Published: (2014)
by: Yalli, Jameel Shehu, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
A spatial analysis on GIS-Hedonic pricing model on the influence of public open space and house price in Klang Valley, Malaysia
by: Asmawi, M. Zainora, et al.
Published: (2016)
by: Asmawi, M. Zainora, et al.
Published: (2016)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Similar Items
-
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016) -
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016) -
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016) -
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016) -
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)