Alert button
Picture for Pablo Moriano

Pablo Moriano

Alert button

Oak Ridge National Laboratory

CANShield: Signal-based Intrusion Detection for Controller Area Networks

Add code
Bookmark button
Alert button
May 03, 2022
Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou

Figure 1 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 2 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 3 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 4 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Viaarxiv icon

Detecting CAN Masquerade Attacks with Signal Clustering Similarity

Add code
Bookmark button
Alert button
Jan 07, 2022
Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

Figure 1 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 2 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 3 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 4 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Viaarxiv icon

Graph-Based Machine Learning Improves Just-in-Time Defect Prediction

Add code
Bookmark button
Alert button
Oct 11, 2021
Jonathan Bryan, Pablo Moriano

Figure 1 for Graph-Based Machine Learning Improves Just-in-Time Defect Prediction
Figure 2 for Graph-Based Machine Learning Improves Just-in-Time Defect Prediction
Figure 3 for Graph-Based Machine Learning Improves Just-in-Time Defect Prediction
Figure 4 for Graph-Based Machine Learning Improves Just-in-Time Defect Prediction
Viaarxiv icon

Time-Based CAN Intrusion Detection Benchmark

Add code
Bookmark button
Alert button
Jan 14, 2021
Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

Figure 1 for Time-Based CAN Intrusion Detection Benchmark
Figure 2 for Time-Based CAN Intrusion Detection Benchmark
Figure 3 for Time-Based CAN Intrusion Detection Benchmark
Viaarxiv icon

Using Bursty Announcements for Early Detection of BGP Routing Anomalies

Add code
Bookmark button
Alert button
May 14, 2019
Pablo Moriano, Raquel Hill, L. Jean Camp

Figure 1 for Using Bursty Announcements for Early Detection of BGP Routing Anomalies
Figure 2 for Using Bursty Announcements for Early Detection of BGP Routing Anomalies
Figure 3 for Using Bursty Announcements for Early Detection of BGP Routing Anomalies
Figure 4 for Using Bursty Announcements for Early Detection of BGP Routing Anomalies
Viaarxiv icon