Fig. 9From: Intrusion detection system for controller area networkIntrusion detection systemBack to article page