{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:31:37Z","timestamp":1743114697961,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129415"},{"type":"electronic","value":"9783030129422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_10","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks"],"prefix":"10.1007","author":[{"given":"Camil","family":"Jichici","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"10_CR1","unstructured":"Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th USENIX Security Symposium (2016)"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TVT.2018.2810232","volume":"67","author":"W Choi","year":"2018","unstructured":"Choi, W., Jo, H.J., Woo, S., Chun, J.Y., Park, J., Lee, D.H.: Identifying ECUs using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Technol. 67(6), 4757\u20134770 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","volume":"13","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: low-level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 13, 2114\u20132129 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-35404-5_15"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1109\/TII.2013.2239301","volume":"9","author":"B Groza","year":"2013","unstructured":"Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034\u20132042 (2013)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10_CR6","unstructured":"Hartkopp, O., Reuber, C., Schilling, R.: MaCAN-message authenticated CAN. In: 10th International Conference on Embedded Security in Cars (ESCAR 2012) (2012)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-662-53140-2_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"S Jain","year":"2016","unstructured":"Jain, S., Guajardo, J.: Physical layer group key agreement for automotive controller area networks. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 85\u2013105. Springer, Heidelberg (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-662-53140-2_5"},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)","journal-title":"PloS One"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Kang, M.-J., Kang, J.-W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"10_CR10","unstructured":"Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: CaCAN - centralized authentication system in CAN (controller area network). In: 14th International Conference on Embedded Security in Cars (ESCAR 2014) (2014)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame. In: Privacy, Security and Trust (PST) 2017 (2017)","DOI":"10.1109\/PST.2017.00017"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/LES.2014.2354011","volume":"7","author":"C-W Lin","year":"2015","unstructured":"Lin, C.-W., Zhu, Q., Sangiovanni-Vincentelli, A.: Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems. IEEE Embed. Syst. Lett. 7(1), 11\u201314 (2015)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D., Guido, A., Colajanni, M.: Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. In: Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"10_CR14","first-page":"10","volume":"4","author":"A Mueller","year":"2015","unstructured":"Mueller, A., Lothspeich, T.: Plug-and-secure communication for CAN. CAN Newsl. 4, 10\u201314 (2015)","journal-title":"CAN Newsl."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/LSP.2014.2304139","volume":"21","author":"P-S Murvay","year":"2014","unstructured":"Murvay, P.-S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Sig. Process. Lett. 21(4), 395\u2013399 (2014)","journal-title":"IEEE Sig. Process. Lett."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110\u20131115. IEEE (2011)","DOI":"10.1109\/IVS.2011.5940552"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Groll, A., Freiling, F.C.: A structured approach to anomaly detection for in-vehicle networks. In: 2010 Sixth International Conference on Information Assurance and Security (IAS), pp. 92\u201398. IEEE (2010)","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: OBD\n                    \n                      \n                    \n                    $$\\_$$\n                    \n                      \n                        _\n                      \n                    \n                  SecureAlert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-45741-3_15","volume-title":"Computer Security \u2013 ESORICS 2016","author":"A-I Radu","year":"2016","unstructured":"Radu, A.-I., Garcia, F.D.: LeiA: a lightweight authentication protocol for CAN. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 283\u2013300. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-45741-3_15"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63\u201368. IEEE (2016)","DOI":"10.1109\/ICOIN.2016.7427089"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJES.2018.089430","volume":"10","author":"I Studnia","year":"2018","unstructured":"Studnia, I., Alata, E., Nicomette, V., Ka\u00e2niche, M., Laarouchi, Y.: A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1), 1\u201312 (2018)","journal-title":"Int. J. Embed. Syst."},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130\u2013139. IEEE (2016)","DOI":"10.1109\/DSAA.2016.20"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2017.02.023","volume":"123","author":"A Theissler","year":"2017","unstructured":"Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163\u2013173 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"10_CR24","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011 (2011)"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:38:07Z","timestamp":1558478287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}