2022
DOI: 10.48550/arxiv.2212.09268
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

UAVCAN Dataset Description

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Fuzzy is an attack in which an attacker injects a message using dictionary or brute forcing method to infer a valid CAN ID [23]. [21] In-Vehicle Network…”
Section: Network Intrusion Detection Model For Can Protocolmentioning
confidence: 99%
“…Fuzzy is an attack in which an attacker injects a message using dictionary or brute forcing method to infer a valid CAN ID [23]. [21] In-Vehicle Network…”
Section: Network Intrusion Detection Model For Can Protocolmentioning
confidence: 99%
“…Flooding is a type of denial-of-service (DoS) attack that consists of two frames and injects them into the CAN bus. [45][46][47]. It is performed repeatedly in short cycles, delaying the transmission of messages via the CAN bus and consuming resources of the target ECU, thereby interfering with the service.…”
Section: Flooding Attack Scenario Analysismentioning
confidence: 99%