Fig. 6From: Intrusion detection system for controller area networkIntrusion detection systemBack to article page