Urmăriți
Gedare Bloom
Titlu
Citat de
Citat de
Anul
The gem5 simulator: Version 20.0+
J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ...
arXiv preprint arXiv:2007.03152, 2020
2252020
Survey of automotive controller area network intrusion detection systems
C Young, J Zambreno, H Olufowobi, G Bloom
IEEE Design & Test 36 (6), 48-55, 2019
1272019
Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing
H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Transactions on Vehicular Technology 69 (2), 1484-1494, 2019
1092019
Design patterns for the industrial Internet of Things
G Bloom, B Alsulami, E Nwafor, IC Bertolotti
2018 14th IEEE International Workshop on Factory Communication Systems (WFCS …, 2018
952018
OS support for detecting Trojan circuit attacks
G Bloom, B Narahari, R Simha
2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009
912009
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes
C Young, H Olufowobi, G Bloom, J Zambreno
Proceedings of the ACM Workshop on Automotive Cybersecurity, 9-14, 2019
592019
Providing secure execution environments with a last line of defense against Trojan circuit attacks
G Bloom, B Narahari, R Simha, J Zambreno
computers & security 28 (7), 660-669, 2009
532009
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network
H Olufowobi, U Ezeobi, E Muhati, G Robinson, C Young, J Zambreno, ...
Proceedings of the ACM Workshop on Automotive Cybersecurity, 25-30, 2019
492019
On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks
M Nasri, T Chantem, G Bloom, RM Gerdes
2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2019
362019
Shared hardware data structures for hard real-time systems
G Bloom, G Parmer, B Narahari, R Simha
Proceedings of the tenth ACM international conference on Embedded software …, 2012
322012
WeepingCAN: A Stealthy CAN Bus-off Attack
G Bloom
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
302021
Scheduling and thread management with RTEMS
G Bloom, J Sherrill
ACM SIGBED Review 11 (1), 20-25, 2014
292014
Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities
H Olufowobi, G Bloom
Smart Cities Cybersecurity and Privacy, 227-240, 2019
252019
Towards a provenance collection framework for Internet of Things devices
E Nwafor, A Campbell, D Hill, G Bloom
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
25*2017
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets
G Bloom, B Narahari, R Simha, A Namazi, R Levy
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
232015
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery
H Olufowobi, S Hounsinou, G Bloom
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019
192019
Survey of Interoperability Challenges in the Internet of Vehicles
P Agbaje, A Anjum, A Mitra, E Oseghale, G Bloom, H Olufowobi
IEEE Transactions on Intelligent Transportation Systems 23 (12), 22838-22861, 2022
172022
Reverse engineering controller area network messages using unsupervised machine learning
U Ezeobi, H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Consumer Electronics Magazine 11 (1), 50-56, 2020
162020
Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs
E Nwafor, A Campbell, G Bloom
1st International Workshop on Security and Privacy for the Internet-of-Things, 2018
142018
On Spatial Isolation for Mixed Criticality, Embedded Systems
E Armbrust, J Song, G Bloom, G Parmer
Proc. 2nd Workshop on Mixed Criticality Systems (WMC), RTSS, 15-20, 2014
132014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20