Research Article
Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix
Figure 18
Legitimate ID transfer vs. ID transfer in the presence of DoS attack. (a) Legitimate ID transfer matrix. (b) ID transfer matrix for DoS attack occurred.
(a) |
(b) |