{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:23Z","timestamp":1759092443025,"version":"3.44.0"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030589509"},{"type":"electronic","value":"9783030589516"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58951-6_8","type":"book-chapter","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T09:07:40Z","timestamp":1599815260000},"page":"153-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks"],"prefix":"10.1007","author":[{"given":"Abdulmalik","family":"Humayed","sequence":"first","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"8_CR1","unstructured":"Grimm co. cant. https:\/\/github.com\/bitbane\/CANT"},{"key":"8_CR2","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: ACM CCS, pp. 1044\u20131055. ACM (2016)","DOI":"10.1145\/2976749.2978302"},{"key":"8_CR4","unstructured":"Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium (2016)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: ACM CCS (2017)","DOI":"10.1145\/3133956.3134001"},{"issue":"6","key":"8_CR6","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TVT.2018.2810232","volume":"67","author":"W Choi","year":"2018","unstructured":"Choi, W., Jo, H.J., Woo, S., Chun, J.Y., Park, J., Lee, D.H.: Identifying ECUS using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Tech. 67(6), 4757\u20134770 (2018)","journal-title":"IEEE Trans. Veh. Tech."},{"issue":"8","key":"8_CR7","first-page":"2114","volume":"13","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: Voltageids: low-level communication characteristics for automotive intrusion detection system. IEEE TIFS 13(8), 2114\u20132129 (2018)","journal-title":"IEEE TIFS"},{"key":"8_CR8","unstructured":"Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the can bus. ESCAR EUROPE (2016)"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/LES.2013.2264594","volume":"5","author":"A Dardanelli","year":"2013","unstructured":"Dardanelli, A., et al.: A security layer for smartphone-to-vehicle communication over bluetooth. IEEE Embed. Syst. Lett. 5(3), 34\u201337 (2013)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Foruhandeh, M., Man, Y., Gerdes, R., Li, M., Chantem, T.: Simple: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. In: ACSAC, pp. 229\u2013244 (2019)","DOI":"10.1145\/3359789.3359834"},{"key":"8_CR11","unstructured":"Foster, I., Prudhomme, A., Koscher, K., Savage, S.: A story of telematic failures. In: USENIX WOOT, Fast and Vulnerable (2015)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-319-66402-6_27","volume-title":"Computer Security \u2013 ESORICS 2017","author":"S Fr\u00f6schle","year":"2017","unstructured":"Fr\u00f6schle, S., St\u00fchring, A.: Analyzing the capabilities of the CAN attacker. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 464\u2013482. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_27"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gmiden, M., Gmiden, M.H., Trabelsi, H.: An intrusion detection method for securing in-vehicle can bus. In: IEEE STA (2016)","DOI":"10.1109\/STA.2016.7952095"},{"issue":"7","key":"8_CR14","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1109\/TIE.2009.2035462","volume":"57","author":"RA Gupta","year":"2010","unstructured":"Gupta, R.A., Chow, M.-Y.: Networked control system: overview and research trends. IEEE Trans. Ind. Electron. 57(7), 2527\u20132535 (2010)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Halder, S., Conti, M., Das, S.K.: COIDS: a clock offset based intrusion detection system for controller area networks. In: ICDCN (2020)","DOI":"10.1016\/j.pmcj.2021.101385"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Han, K., Potluri, S.D., Shin, K.G.: On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: ACM\/IEEE ICCPS, pp. 160\u2013169 (2013)","DOI":"10.1145\/2502524.2502546"},{"key":"8_CR17","unstructured":"Han, K., Weimerskirch, A., Shin, K.G.: A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier. In: Proceedings of Europe Embedded Security Cars (ESCAR), pp. 13\u201329 (2015)"},{"key":"8_CR18","unstructured":"Hartkopp, O., Schilling, R.M.: Message authenticated can. In: Escar Conference, Berlin, Germany (2012)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"T Hoppe","year":"2008","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks \u2013 practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235\u2013248. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87698-4_21"},{"issue":"6","key":"8_CR20","first-page":"1802","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security a survey. IEEE IoT J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE IoT J."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Humayed, A., Luo, B.: Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks. In: ACM\/IEEE ICCPS (2015)","DOI":"10.1145\/2735960.2735992"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Humayed, A., Luo, B.: Using ID-hopping to defend against targeted DOS on CAN. In: SCAV Workshop (2017)","DOI":"10.1145\/3055378.3055382"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Iehira, K., Inoue, H., Ishida, K.: Spoofing attack using bus-off attacks against a specific ECU of the can bus. In: IEEE CCNC (2018)","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-98935-8_11","volume-title":"Cyber-Physical Systems Security","author":"K Karray","year":"2018","unstructured":"Karray, K., Danger, J.-L., Guilley, S., Elaabid, M.A.: Identifier randomization: an efficient protection against CAN-bus attacks. In: Ko\u00e7, \u00c7.K. (ed.) Cyber-Physical Systems Security, pp. 219\u2013254. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98935-8_11"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Kneib, M., Huth, C.: Scission: signal characteristic-based sender identification and intrusion detection in automotive networks. In: ACM CCS (2018)","DOI":"10.1145\/3243734.3243751"},{"issue":"5","key":"8_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MM.2018.053631143","volume":"38","author":"G Kornaros","year":"2018","unstructured":"Kornaros, G., Tomoutzoglou, O., Coppola, M.: Hardware-assisted security in electronic control units: secure automotive communications by utilizing one-time-programmable network on chip and firewalls. IEEE Micro 38(5), 63\u201374 (2018)","journal-title":"IEEE Micro"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: IEEE S&P (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"8_CR28","unstructured":"Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: Cacan-centralized authentication system in can (controller area network). In: International Conference on ESCAR (2014)"},{"issue":"2","key":"8_CR29","first-page":"32","volume":"21","author":"M Lukasiewycz","year":"2016","unstructured":"Lukasiewycz, M., Mundhenk, P., Steinhorst, S.: Security-aware obfuscated priority assignment for automotive can platforms. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 21(2), 32 (2016)","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of preventing unauthorized data transmission in controller area network. In: IEEE VTC (2012)","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"8_CR31","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21, 260\u2013264 (2013)","journal-title":"Def Con"},{"key":"8_CR32","first-page":"91","volume":"2015","author":"C Miller","year":"2015","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)","journal-title":"Black Hat USA"},{"key":"8_CR33","first-page":"129","volume":"34","author":"EF Moore","year":"1956","unstructured":"Moore, E.F.: Gedanken-experiments on sequential machines. Automata Stud. 34, 129\u2013153 (1956)","journal-title":"Automata Stud."},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2960407","volume":"22","author":"P Mundhenk","year":"2017","unstructured":"Mundhenk, P., et al.: Security in automotive networks: lightweight authentication and authorization. ACM TODAES 22(2), 1\u201327 (2017)","journal-title":"ACM TODAES"},{"issue":"4","key":"8_CR35","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/LSP.2014.2304139","volume":"21","author":"P-S Murvay","year":"2014","unstructured":"Murvay, P.-S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Signal Process. Lett. 21(4), 395\u2013399 (2014)","journal-title":"IEEE Signal Process. Lett."},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Murvay, P.-S., Groza, B.: Dos attacks on controller area networks by fault injections from the software layer. In: ARES. ACM (2017)","DOI":"10.1145\/3098954.3103174"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicles Symposium (2011)","DOI":"10.1109\/IVS.2011.5940552"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: Obd\\_securealert: an anomaly detection system for vehicles. In: IEEE SMARTCOMP (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"8_CR39","first-page":"1","volume":"25","author":"S Nie","year":"2017","unstructured":"Nie, S., Liu, L., Yuefeng, D.: Free-fall: hacking tesla from wireless to can bus. Brief. Black Hat USA 25, 1\u201316 (2017)","journal-title":"Brief. Black Hat USA"},{"key":"8_CR40","unstructured":"Nowdehi, N., Aoudi, W., Almgren, M., Olovsson, T.: CASAD: can-aware stealthy-attack detection for in-vehicle networks. arXiv:1909.08407 (2019)"},{"key":"8_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53140-2_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"S N\u00fcrnberger","year":"2016","unstructured":"N\u00fcrnberger, S., Rossow, C.: \u2013 vatiCAN\u00a0\u2013 vetted, authenticated CAN bus. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 106\u2013124. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_6"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-60876-1_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Palanca","year":"2017","unstructured":"Palanca, A., Evenchick, E., Maggi, F., Zanero, S.: A stealth, selective, link-layer denial-of-service attack against automotive networks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 185\u2013206. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_9"},{"issue":"2","key":"8_CR43","first-page":"546","volume":"16","author":"J Petit","year":"2015","unstructured":"Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546\u2013556 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"8_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-45741-3_15","volume-title":"Computer Security \u2013 ESORICS 2016","author":"A-I Radu","year":"2016","unstructured":"Radu, A.-I., Garcia, F.D.: LeiA: a lightweight authentication protocol for CAN. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 283\u2013300. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_15"},{"key":"8_CR45","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.procs.2017.09.021","volume":"114","author":"S Rizvi","year":"2017","unstructured":"Rizvi, S., Willet, J., Perino, D., Marasco, S., Condo, C.: A threat to vehicular cyber security and the urgency for correction. Procedia Comput. Sci. 114, 100\u2013105 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR46","unstructured":"Rouf, I., et al.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: USENIX Security Symposium (2010)"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Sagstetter, F., et al.: Security challenges in automotive hardware\/software architecture design. In: DATE. IEEE (2013)","DOI":"10.7873\/DATE.2013.102"},{"key":"8_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-319-99229-7_27","volume-title":"Computer Safety, Reliability, and Security","author":"D Souma","year":"2018","unstructured":"Souma, D., Mori, A., Yamamoto, H., Hata, Y.: Counter attacks for bus-off attacks. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11094, pp. 319\u2013330. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99229-7_27"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y.: Survey on security threats and protection mechanisms in embedded automotive networks. In: IEEE\/IFIP DSN (2013)","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"8_CR50","doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: IEEE DSAA (2016)","DOI":"10.1109\/DSAA.2016.20"},{"key":"8_CR51","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2017.02.023","volume":"123","author":"A Theissler","year":"2017","unstructured":"Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163\u2013173 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"8_CR52","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-74176-5_25","volume-title":"Industrial Networks and Intelligent Systems","author":"D Tian","year":"2018","unstructured":"Tian, D., et al.: an intrusion detection system based on machine learning for CAN-Bus. In: Chen, Y., Duong, T.Q. (eds.) INISCOM 2017. LNICST, vol. 221, pp. 285\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74176-5_25"},{"key":"8_CR53","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., M\u00fchlberg, J.T., Piessens, F.: Vulcan: efficient component authentication and software isolation for automotive control networks. In: ACSAC, pp. 225\u2013237 (2017)","DOI":"10.1145\/3134600.3134623"},{"key":"8_CR54","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: Canauth-a simple, backward compatible broadcast authentication protocol for can bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011 (2011)"},{"key":"8_CR55","doi-asserted-by":"crossref","unstructured":"Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the can bus of vehicles. In: IEEE International Conference on IOT (2014)","DOI":"10.1109\/IOT.2014.7030108"},{"key":"8_CR56","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Workshop on Embedded Security in Cars (2004)"},{"issue":"2","key":"8_CR57","first-page":"993","volume":"16","author":"S Woo","year":"2014","unstructured":"Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993\u20131006 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"8_CR58","doi-asserted-by":"publisher","first-page":"15521","DOI":"10.1109\/ACCESS.2019.2892961","volume":"7","author":"S Woo","year":"2019","unstructured":"Woo, S., Moon, D., Youn, T.-Y., Lee, Y., Kim, Y.: Can ID shuffling technique (CIST): moving target defense strategy for protecting in-vehicle can. IEEE Access 7, 15521\u201315536 (2019)","journal-title":"IEEE Access"},{"key":"8_CR59","doi-asserted-by":"publisher","first-page":"54607","DOI":"10.1109\/ACCESS.2018.2870695","volume":"6","author":"W Wu","year":"2018","unstructured":"Wu, W., et al.: IDH-CAN: a hardware-based ID hopping can mechanism with enhanced security for automotive real-time applications. IEEE Access 6, 54607\u201354623 (2018)","journal-title":"IEEE Access"},{"key":"8_CR60","doi-asserted-by":"crossref","unstructured":"Ziermann, T., Wildermann, S., Teich, J.: Can+: a new backward-compatible controller area network (can) protocol with up to 16$$\\times $$ higher data rates. In: DATE. IEEE (2009)","DOI":"10.1109\/DATE.2009.5090826"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58951-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:04:28Z","timestamp":1757541868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58951-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030589509","9783030589516"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58951-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/esorics2020.sccs.surrey.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"366","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,16","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9,1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-10 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}