Securing connected vehicle fleets with an adaptable, multi-network intrusion detection system
Stephane Strahm and Cavy Pan explain how to integrate IDS software across multi-network environments and application processor “detection-isolation-report-response” algorithms.