Pub Date : 2022-05-25DOI: 10.1007/s11416-022-00430-5
Gianpiero Costantino, I. Matteucci
{"title":"Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities","authors":"Gianpiero Costantino, I. Matteucci","doi":"10.1007/s11416-022-00430-5","DOIUrl":"https://doi.org/10.1007/s11416-022-00430-5","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"33 - 49"},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42449122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-22DOI: 10.1007/s11416-022-00429-y
Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao
{"title":"Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning","authors":"Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao","doi":"10.1007/s11416-022-00429-y","DOIUrl":"https://doi.org/10.1007/s11416-022-00429-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"453-463"},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47258325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1007/s11416-022-00428-z
A. Epishkina, Nikolay Karapetyants, K. Kogos, Philipp V. Lebedev
{"title":"Covert channel limitation via special dummy traffic generating","authors":"A. Epishkina, Nikolay Karapetyants, K. Kogos, Philipp V. Lebedev","doi":"10.1007/s11416-022-00428-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00428-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"341 - 349"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41746975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-05DOI: 10.1007/s11416-022-00426-1
Rémi Adelin, C. Nugier, E. Alata, V. Nicomette, Vincent Migliore, M. Kaâniche
{"title":"Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol","authors":"Rémi Adelin, C. Nugier, E. Alata, V. Nicomette, Vincent Migliore, M. Kaâniche","doi":"10.1007/s11416-022-00426-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00426-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"425-452"},"PeriodicalIF":0.0,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44164716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.1007/s11416-022-00421-6
Mohammed Ali Elsiddig, Mohammed Mejri
{"title":"Detection of suspicious internet traffic based on differential analysis and logical rules","authors":"Mohammed Ali Elsiddig, Mohammed Mejri","doi":"10.1007/s11416-022-00421-6","DOIUrl":"https://doi.org/10.1007/s11416-022-00421-6","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"347 - 365"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42216600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-12DOI: 10.1007/s11416-022-00420-7
F. Tommasi, C. Catalano, Umberto Corvaglia, I. Taurino
{"title":"MinerAlert: an hybrid approach for web mining detection","authors":"F. Tommasi, C. Catalano, Umberto Corvaglia, I. Taurino","doi":"10.1007/s11416-022-00420-7","DOIUrl":"https://doi.org/10.1007/s11416-022-00420-7","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 5","pages":"333 - 346"},"PeriodicalIF":0.0,"publicationDate":"2022-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41268247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1007/s11416-022-00418-1
A. Babash, E. Baranova
{"title":"Partially identified Babassu cipher and attack on it","authors":"A. Babash, E. Baranova","doi":"10.1007/s11416-022-00418-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00418-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"271 - 274"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45347871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}