References
- B. Mukherjee, L. T. Heberlein & K. N. Levitt. (1994). Network intrusion detection. IEEE network, 8(3), 26-41. https://doi.org/10.1109/65.283931
- P. Garcia-Teodoro, J. Diaz-Verdejo. G. Macia-Fernandez & E. Vazquez. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1-2), 18-28. https://doi.org/10.1016/j.cose.2008.08.003
- E. M. Yang, H. J. Lee & C. H. Seo. (2017). Comparison of Detection Performance of Intrusion Detection System Using Fuzzy and Artificial Neural Network. Journal of Digital Convergence, 15(6), 391-398. https://doi.org/10.14400/JDC.2017.15.6.391
- Vehicle anomaly detection tutorial, Information protection R&D data challenge.
- D. H. Choi & J. H. Park. (2015). Security tendency analysis techniques through machine learning algorithms applications in big data environments. Journal of Digital Convergence, 13(9), 269-276. https://doi.org/10.14400/JDC.2015.13.9.269
- M. S. Han & W. S. Bae. (2014). Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, 12(8), 229-234. https://doi.org/10.14400/JDC.2014.12.8.229
- S. J. Lee & W. S. Bae. (2015). Inter-device Mutual Authentication and Formal Verification in Vehicular Security System. Journal of Digital Convergence, 13(4), 205-210. https://doi.org/10.14400/JDC.2015.13.4.205
- S. J. Lee & W. S. Bae. (2015). Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication. Journal of Digital Convergence, 13(9), 297-302. https://doi.org/10.14400/JDC.2015.13.9.297
- CAN intrusion dataset. http://ocslab.hksecurity.net/Datasets/CAN-intrusion-dataset
- L. Portnoy, E. Eskin & S. Stolfo. (2001). Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001.
- L. M. Manevitz & M. Yousef. (2001). One-class SVMs for document classification. Journal of machine Learning research, 2(Dec), 139-154.
- H. S. Lee, S. H. Jeong & Huy Kang Kim. (2017). OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame, PST (Privacy, Security and Trust).
- H. M. Song, H. R. Kim & Huy Kang Kim. (2016). Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network, In Information Networking (ICOIN), 2016 International Conference on. IEEE. 63-68.
- S. Woo, H. J. Jo & D. H. Lee. (2015). A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation Systems, 16(2), 993-1006. https://doi.org/10.1109/TITS.2014.2351612
- WEKA, https://www.cs.waikato.ac.nz/ml/weka/
- C. C. Chang & C. J. Lin. (2011). LIBSVM: a library for support vector machines. ACM transactions on intelligent systems and technology (TIST), 2(3), 27.
- D. E. Goldberg & J. H. Holland. (1988). Genetic algorithms and machine learning. Machine learning, 3(2), 95-99. https://doi.org/10.1023/A:1022602019183
- F. Glover. (1989). Tabu search-part I. ORSA Journal on computing, 1(3), 190-206. https://doi.org/10.1287/ijoc.1.3.190
- P. J. Van Laarhoven & E. H. Aarts. (1987). Simulated annealing. In Simulated annealing: Theory and applications. Springer, Dordrecht, 7-15.
- Metaheuristic, https://en.wikipedia.org/wiki/Metaheuristic