{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:52:41Z","timestamp":1762005161787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_16","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"241-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe"],"prefix":"10.1007","author":[{"given":"Camil","family":"Jichici","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"21266","DOI":"10.1109\/ACCESS.2019.2894183","volume":"7","author":"OY Al-Jarrah","year":"2019","unstructured":"Al-Jarrah, O.Y., Maple, C., Dianati, M., Oxtoby, D., Mouzakitis, A.: Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7, 21266\u201321289 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"16_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.4236\/wet.2018.94007","volume":"9","author":"A Alshammari","year":"2018","unstructured":"Alshammari, A., Zohdy, M.A., Debnath, D., Corser, G.: Classification approach for intrusion detection in vehicle systems. Wirel. Eng. Technol. 9(4), 79\u201394 (2018)","journal-title":"Wirel. Eng. Technol."},{"key":"16_CR3","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, vol. 4, pp. 447\u2013462, San Francisco (2011)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1044\u20131055. ACM (2016)","DOI":"10.1145\/2976749.2978302"},{"issue":"2","key":"16_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"16_CR6","unstructured":"Everett, C.E., McCoy, D.: $$\\{$$OCTANE$$\\}$$ (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. Presented as Part of the 6th Workshop on Cyber Security Experimentation and Test (2013)"},{"issue":"4","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TIFS.2018.2869351","volume":"14","author":"B Groza","year":"2019","unstructured":"Groza, B., Murvay, P.-S.: Efficient intrusion detection with bloom filtering in controller area networks. IEEE Trans. Inf. Forensics Secur. 14(4), 1037\u20131051 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ress.2010.06.026","volume":"96","author":"T Hoppe","year":"2011","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1), 11\u201325 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)","journal-title":"PloS One"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 528\u2013533. IEEE (2011)","DOI":"10.1109\/IVS.2011.5940525"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 Privacy, Security and Trust (PST) (2017)","DOI":"10.1109\/PST.2017.00017"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D., Guido, A., Colajanni, M.: Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. In: Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"16_CR13","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def. Con. 21, 260\u2013264 (2013)","journal-title":"Def. Con."},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Murvay, P.-S., Groza, B.: DoS attacks on controller area networks by fault injections from the software layer. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017, pp. 71:1\u201371:10 (2017)","DOI":"10.1145\/3098954.3103174"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110\u20131115. IEEE (2011)","DOI":"10.1109\/IVS.2011.5940552"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: OBD\\_SecureAlert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"16_CR17","doi-asserted-by":"publisher","unstructured":"Nilsson, D.K., Larson, U.E., Picasso, F., Jonsson, E.: A first simulation of attacks in the automotive network communications protocol FlexRay. In: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS 2008, pp. 84\u201391. Springer (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88181-0_11","DOI":"10.1007\/978-3-540-88181-0_11"},{"issue":"2","key":"16_CR18","first-page":"546","volume":"16","author":"J Petit","year":"2014","unstructured":"Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546\u2013556 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Stabili, D., Marchetti, M., Colajanni, M.: Detecting attacks to internal vehicle networks through Hamming distance. In: 2017 AEIT International Annual Conference, pp. 1\u20136. IEEE (2017)","DOI":"10.23919\/AEIT.2017.8240550"},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.eswa.2010.08.137","volume":"38","author":"M-Y Su","year":"2011","unstructured":"Su, M.-Y.: Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers. Expert Syst. Appl. 38(4), 3492\u20133498 (2011)","journal-title":"Expert Syst. Appl."},{"key":"16_CR21","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-74176-5_25","volume-title":"Industrial Networks and Intelligent Systems","author":"D Tian","year":"2018","unstructured":"Tian, D., et al.: An intrusion detection system based on machine learning for CAN-bus. In: Chen, Y., Duong, T.Q. (eds.) INISCOM 2017. LNICST, vol. 221, pp. 285\u2013294. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-74176-5_25"},{"key":"16_CR22","unstructured":"Vector: CAPL DLL Description (2007)"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:15:58Z","timestamp":1582848958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}