Completed
Signature vs Anomaly
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Automotive Security - Trends, Problems, Solutions, and Future Work
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Car Hacking
- 3 Jeep Cherokee Hack
- 4 Attack Surfaces
- 5 Network Connectivity
- 6 Software Complexity
- 7 Remote Connectivity
- 8 PointtoPoint Networking
- 9 Controller Area Network
- 10 Network Architectures
- 11 Exploits
- 12 Spoofing
- 13 What can we do
- 14 Signature vs Anomaly
- 15 Based Approaches
- 16 RealTime Model
- 17 Classification Approach
- 18 Evaluation
- 19 Future Work