Voltar aos Detalhes do Artigo
Cybersecurity in the CAN Protocol: A Systematic Mapping of Attacks and Vulnerabilities in Practical Scenarios
Baixar
##common.downloadPdf##