{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:38:10Z","timestamp":1726079890608},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030450953"},{"type":"electronic","value":"9783030450960"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45096-0_17","type":"book-chapter","created":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T23:03:45Z","timestamp":1586905425000},"page":"137-144","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Sources for Information Extraction in Automotive Forensics"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Attenberger","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,15]]},"reference":[{"issue":"3","key":"17_CR1","first-page":"3","volume":"46","author":"RN Charette","year":"2009","unstructured":"Charette, R.N.: This car runs on code. IEEE Spectr. 46(3), 3 (2009)","journal-title":"IEEE Spectr."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Combining physical and digital evidence in vehicle environments. In: 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 10\u201314 (May 2008)","DOI":"10.1109\/SADFE.2008.10"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Le-Khac, N.A., Jacobs, D., Nijhoff, J., Bertens, K., Choo, K.K.R.: Smart vehicle forensics: challenges and case study. Future Gener. Comput. Syst. (2018)","DOI":"10.1016\/j.future.2018.05.081"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-33678-2_11","volume-title":"Computer Safety, Reliability, and Security","author":"T Hoppe","year":"2012","unstructured":"Hoppe, T., Kuhlmann, S., Kiltz, S., Dittmann, J.: IT-forensic automotive investigations on the example of route reconstruction on automotive system and communication data. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7612, pp. 125\u2013136. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-33678-2_11"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Jacobs, D., Choo, K.R., Kechadi, M., Le-Khac, N.: Volkswagen car entertainment system forensics. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 699\u2013705 (August 2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.302"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Mansor, H., Markantonakis, K., Akram, R.N., Mayes, K., Gurulian, I.: Log your car: the non-invasive vehicle forensics. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 974\u2013982 (August 2016)","DOI":"10.1109\/TrustCom.2016.0164"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Feng, X., Dawam, E.S., Amin, S.: A new digital forensics model of smart city automated vehicles. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 274\u2013279 (June 2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47"},{"issue":"1","key":"17_CR8","first-page":"30","volume":"1","author":"CJ Whelan","year":"2018","unstructured":"Whelan, C.J., Sammons, J., McManus, B., Fenger, T.W.: Retrieval of infotainment system artifacts from vehicles using iVe. J. Appl. Digit. Evid. 1(1), 30 (2018)","journal-title":"J. Appl. Digit. Evid."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Bortles, W., McDonough, S., Smith, C., Stogsdill, M.: An introduction to the forensic acquisition of passenger vehicle infotainment and telematics systems data. In: SAE Technical Paper. SAE International (2017)","DOI":"10.4271\/2017-01-1437"},{"issue":"14","key":"17_CR10","doi-asserted-by":"publisher","first-page":"e3855","DOI":"10.1002\/cpe.3855","volume":"29","author":"NDW Cahyani","year":"2017","unstructured":"Cahyani, N.D.W., Martini, B., Choo, K.K.R., Al-Azhar, A.M.N.: Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput. Pract. Exp. 29(14), e3855 (2017)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-658-20779-3_9","volume-title":"Mobilit\u00e4t und digitale Transformation","author":"H Barth","year":"2018","unstructured":"Barth, H.: Big data analytics f\u00fcr connected cars. Mobilit\u00e4t und digitale Transformation, pp. 137\u2013151. Springer, Wiesbaden (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-658-20779-3_9"},{"issue":"4","key":"17_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s38314-017-0054-x","volume":"12","author":"SF Wiesbaden","year":"2017","unstructured":"Wiesbaden, S.F.: Personen + Unternehmen. ATZelektronik 12(4), 6\u20137 (2017)","journal-title":"ATZelektronik"},{"key":"17_CR13","unstructured":"Knobloch, C.: Telematics systems available for 3rd Parties in comparison to OEMs telematics systems (2018). \nhttps:\/\/www.figiefa.eu\/wp-content\/uploads\/Presentation.pdf"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 528\u2013533 (June 2011)","DOI":"10.1109\/IVS.2011.5940525"},{"issue":"99","key":"17_CR15","first-page":"1","volume":"20","author":"U Fugiglando","year":"2018","unstructured":"Fugiglando, U., et al.: Driving behavior analysis through can bus data in an uncontrolled environment. IEEE Trans. Intell. Transp. Syst. 20(99), 1\u201312 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"17_CR16","volume-title":"Pattern Recognition","author":"S Theodoridis","year":"2009","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern Recognition, 4th edn. Elsevier Inc., Amsterdam (2009)","edition":"4"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Kwak, B.I., Woo, J., Kim, H.K.: Know your master: driver profiling-based anti-theft method. In: PST 2016 (2016)","DOI":"10.1109\/PST.2016.7906929"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"El Basiouni El Masri, A., Artail, H., Akkary, H.: Toward self-policing: detecting drunk driving behaviors through sampling CAN bus data. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1\u20135 (November 2017)","DOI":"10.1109\/ICECTA.2017.8252037"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"T Hoppe","year":"2008","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks \u2013 practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235\u2013248. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-87698-4_21"},{"key":"17_CR20","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco, vol. 4, pp. 447\u2013462 (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Systems Theory \u2013 EUROCAST 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45096-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T23:16:23Z","timestamp":1586906183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45096-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030450953","9783030450960"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45096-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Systems Theory","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Palmas de Gran Canaria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocast2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/eurocast2019.fulp.ulpgc.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}