Fig. 4From: Intrusion detection system for controller area networkIntrusion detection systemBack to article page