dc.contributor.author | Hellemans, Wouter | |
dc.contributor.author | Rabbani, Md Masoom | |
dc.contributor.author | Preneel, Bart | |
dc.contributor.author | Mentens, Nele | |
dc.date.accessioned | 2024-04-30T07:44:07Z | |
dc.date.available | 2024-03-02T17:43:15Z | |
dc.date.available | 2024-04-30T07:44:07Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | N/A | |
dc.identifier.other | WOS:001116950900058 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/43619.2 | |
dc.source | WOS | |
dc.title | Yes we CAN! Towards bringing security to legacy-restricted Controller Area Networks. A review | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Preneel, Bart | |
dc.identifier.doi | 10.1145/3587135.3592818 | |
dc.identifier.eisbn | 979-8-4007-0140-5 | |
dc.source.numberofpages | 6 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 352 | |
dc.source.endpage | 357 | |
dc.source.conference | 20th ACM International Conference on Computing Frontiers (CF) | |
dc.source.conferencedate | MAY 09-11, 2023 | |
dc.source.conferencelocation | Bologna | |
dc.source.journal | N/A | |
imec.availability | Published - imec | |
dc.description.wosFundingText | This work is supported by CyberSecurity Research Flanders with reference number VR20192203. This work is also partially supported by the COllective Research NETworking (CORNET) project "TrustedIOT: Trusted Computing Architectures for IoT Devices". The Belgian partners are funded by VLAIO under grant number HBC.2021.0895. | |