The gem5 simulator: Version 20.0+ J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ... arXiv preprint arXiv:2007.03152, 2020 | 256 | 2020 |
Survey of automotive controller area network intrusion detection systems C Young, J Zambreno, H Olufowobi, G Bloom IEEE Design & Test 36 (6), 48-55, 2019 | 134 | 2019 |
Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing H Olufowobi, C Young, J Zambreno, G Bloom IEEE Transactions on Vehicular Technology 69 (2), 1484-1494, 2019 | 118 | 2019 |
Design patterns for the industrial Internet of Things G Bloom, B Alsulami, E Nwafor, IC Bertolotti 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS …, 2018 | 101 | 2018 |
OS support for detecting Trojan circuit attacks G Bloom, B Narahari, R Simha 2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009 | 92 | 2009 |
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes C Young, H Olufowobi, G Bloom, J Zambreno Proceedings of the ACM Workshop on Automotive Cybersecurity, 9-14, 2019 | 63 | 2019 |
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network H Olufowobi, U Ezeobi, E Muhati, G Robinson, C Young, J Zambreno, ... Proceedings of the ACM Workshop on Automotive Cybersecurity, 25-30, 2019 | 54 | 2019 |
Providing secure execution environments with a last line of defense against Trojan circuit attacks G Bloom, B Narahari, R Simha, J Zambreno computers & security 28 (7), 660-669, 2009 | 53 | 2009 |
On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks M Nasri, T Chantem, G Bloom, RM Gerdes 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2019 | 36 | 2019 |
Survey of Interoperability Challenges in the Internet of Vehicles P Agbaje, A Anjum, A Mitra, E Oseghale, G Bloom, H Olufowobi IEEE Transactions on Intelligent Transportation Systems 23 (12), 22838-22861, 2022 | 34 | 2022 |
WeepingCAN: A Stealthy CAN Bus-off Attack G Bloom Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021 | 32 | 2021 |
Shared hardware data structures for hard real-time systems G Bloom, G Parmer, B Narahari, R Simha Proceedings of the tenth ACM international conference on Embedded software …, 2012 | 31 | 2012 |
Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities H Olufowobi, G Bloom Smart Cities Cybersecurity and Privacy, 227-240, 2019 | 28 | 2019 |
Scheduling and thread management with RTEMS G Bloom, J Sherrill ACM SIGBED Review 11 (1), 20-25, 2014 | 28 | 2014 |
Towards a provenance collection framework for Internet of Things devices E Nwafor, A Campbell, D Hill, G Bloom 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017 | 25* | 2017 |
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets G Bloom, B Narahari, R Simha, A Namazi, R Levy 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 24 | 2015 |
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery H Olufowobi, S Hounsinou, G Bloom Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019 | 22 | 2019 |
Reverse engineering controller area network messages using unsupervised machine learning U Ezeobi, H Olufowobi, C Young, J Zambreno, G Bloom IEEE Consumer Electronics Magazine 11 (1), 50-56, 2020 | 19 | 2020 |
Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs E Nwafor, A Campbell, G Bloom 1st International Workshop on Security and Privacy for the Internet-of-Things, 2018 | 15 | 2018 |
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection H Lawrence, U Ezeobi, O Tauil, J Nosal, O Redwood, Y Zhuang, G Bloom Journal of Systems Architecture 129, 102621, 2022 | 14 | 2022 |