Andrew Roche's research while affiliated with University of Louisiana at Lafayette and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
The lack of security in today’s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle’s normal behavior. The attacker may exp...
Citations
... These security concerns are explored and listed based on the different cyber-attacks that target the vehicular systems, networks, and environment. We studied the existing vulnerabilities and attacks from different research papers, including [29][30][31][32][33][70][71][72][73]. We focus on the papers that discuss and analyze vehicular issues to work on solving them using AI techniques, among others. ...
... Furthermore, the power supply must be regulated by dedicated hardware, not classical vehicles. Researchers discussed how the EV charging infrastructure could be exploited by attackers [9], however, neglecting the in-vehicle threats. Contribution. ...