Author of the publication

Conducting forensic investigations of cyber attacks on automobile in-vehicle networks.

, and . e-Forensics, page 8. ICST/ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key management and secure software updates in wireless process control environments., , , and . WISEC, page 100-108. ACM, (2008)Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes., , and . VTC Fall, page 1-5. IEEE, (2008)Auxiliary channel Diffie-Hellman encrypted key-exchange authentication., , and . QSHINE, page 18. ICST, (2008)Conducting forensic investigations of cyber attacks on automobile in-vehicle networks., and . e-Forensics, page 8. ICST/ACM, (2008)How to Secure Bluetooth-Based Pico Networks., , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 209-223. Springer, (2007)Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks., and . IJDCF, 1 (2): 28-41 (2009)Online Self-Healing Support for Embedded Systems., , , and . ISORC, page 283-287. IEEE Computer Society, (2009)Operator-Centric and Adaptive Intrusion Detection., , , and . IAS, page 161-166. IEEE Computer Society, (2008)Building a self-healing embedded system in a multi-OS environment., , , and . SAC, page 293-298. ACM, (2009)An Approach to using Honeypots in In-Vehicle Networks., , , and . VTC Fall, page 1-5. IEEE, (2008)