40 results on '"Jo, Hyo Jin"'
Search Results
2. Effect of Periodic Changes in Rotation Speed on Torsional Stress and Screw-in Force by Alternative Rotation Technique
3. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks
4. In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features
5. ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System
6. TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain
7. G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN protocol
8. In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features
9. Adversarial Example Detection Based on Improved GhostBusters
10. SOME/IP Intrusion Detection System Using Machine Learning
11. Vulnerabilities of Android OS-Based Telematics System
12. A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
13. ASD: ARP Spoofing Detector Using OpenWrt
14. TTIDS: Transmission-resuming Time-based Intrusion Detection System for Controller Area Network (CAN)
15. Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing
16. Torsional Resistance of Heat-Treated Nickel-Titanium Instruments under Different Temperature Conditions
17. Treatment Outcomes With Rituximab in 100 Patients With Neuromyelitis Optica: Influence of FCGR3A Polymorphisms on the Therapeutic Response to Rituximab
18. An Enhanced Method for Reverse Engineering CAN Data Payload
19. Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity
20. Fiber-reinforced composite post removal using guided endodontics: a case report
21. MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks
22. Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone
23. BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems
24. How to Securely Record Logs based on ARM TrustZone
25. T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method
26. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
27. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks
28. Reliable Cooperative Authentication for Vehicular Networks
29. BadVoice: Soundless voice-control replay attack on modern smartphones
30. Vulnerabilities of Android OS-Based Telematics System
31. A Practical Security Architecture for In-Vehicle CAN-FD
32. Cognitive impairment differs between neuromyelitis optica spectrum disorder and multiple sclerosis
33. Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems
34. Secure Messenger System using Attribute Based Encryption
35. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
36. Hyponatremia after Thyroid Hormone Withdrawal in a Patient with Papillary Thyroid Carcinoma
37. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN
38. The Sub Authentication Method For Driver Using Driving Patterns
39. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN.
40. Cognitive impairment differs between neuromyelitis optica spectrum disorder and multiple sclerosis.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.