Voltar aos Detalhes do Artigo Cybersecurity in the CAN Protocol: A Systematic Mapping of Attacks and Vulnerabilities in Practical Scenarios Baixar ##common.downloadPdf##