{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:45Z","timestamp":1743011865545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031088186"},{"type":"electronic","value":"9783031088193"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08819-3_9","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:02:45Z","timestamp":1655265765000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol"],"prefix":"10.1007","author":[{"given":"Md Rezanur","family":"Islam","sequence":"first","affiliation":[]},{"given":"Insu","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Munkhdelgerekh","family":"Batzorig","sequence":"additional","affiliation":[]},{"given":"Myoungsu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MITS.2018.2889714","volume":"13","author":"KB Kelarestaghi","year":"2021","unstructured":"Kelarestaghi, K.B., Foruhandeh, M., Heaslip, K., Gerdes, R.: Intelligent transportation system security: impact-oriented risk assessment of in-vehicle networks. IEEE Intell. Transp. Syst. Mag. 13(2), 91\u2013104 (2021). https:\/\/doi.org\/10.1109\/MITS.2018.2889714","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"issue":"05","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1850082","DOI":"10.1142\/S0218126618500822","volume":"27","author":"B Carnevale","year":"2018","unstructured":"Carnevale, B., Fanucci, L., Bisase, S., Hunjan, H.: MACsec-based security for automotive ethernet backbones. J. Circuits Syst. Comput. 27(05), 1850082 (2018). https:\/\/doi.org\/10.1142\/S0218126618500822","journal-title":"J. Circuits Syst. Comput."},{"key":"9_CR3","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Security Symposium, pp. 77\u201392 (2011)"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 82721\u201382743 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"9_CR5","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-50399-4_23","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing","author":"Y An","year":"2021","unstructured":"An, Y., Park, J., Oh, I., Kim, M., Yim, K.: Design and implementation of a novel testbed for automotive security analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) IMIS 2020. AISC, vol. 1195, pp. 234\u2013243. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-50399-4_23"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Muter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110\u20131115, June 2011. https:\/\/doi.org\/10.1109\/IVS.2011.5940552","DOI":"10.1109\/IVS.2011.5940552"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network (2016). https:\/\/doi.org\/10.1109\/ICOIN.2016.7427089","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"9_CR8","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-030-90072-4_32","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"MR Islam","year":"2022","unstructured":"Islam, M.R., Oh, I., Batzorig, M., Kim, S., Yim, K.: A concept of IDS for CAN protocol based on statics theory. In: Barolli, L. (ed.) BWCCA 2021. LNNS, vol. 346, pp. 294\u2013302. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-90072-4_32"},{"issue":"3","key":"9_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MDAT.2020.3011036","volume":"38","author":"HM Song","year":"2021","unstructured":"Song, H.M., Kim, H.K.: Discovering CAN specification using on-board diagnostics. IEEE Des. Test 38(3), 93\u2013103 (2021). https:\/\/doi.org\/10.1109\/MDAT.2020.3011036","journal-title":"IEEE Des. Test"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 57\u20135709. IEEE (2017). https:\/\/doi.org\/10.1109\/PST.2017.00017","DOI":"10.1109\/PST.2017.00017"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.vehcom.2017.02.005","volume":"9","author":"M Markovitz","year":"2017","unstructured":"Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43\u201352 (2017). https:\/\/doi.org\/10.1016\/j.vehcom.2017.02.005","journal-title":"Veh. Commun."},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile (2010). https:\/\/doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Haas, R.E., Moller, D.P.F., Bansal, P., Ghosh, R., Bhat, S.S.: Intrusion detection in connected cars. In: 2017 IEEE International Conference on Electro Information Technology (EIT), pp. 516\u2013519, May 2017. https:\/\/doi.org\/10.1109\/EIT.2017.8053416","DOI":"10.1109\/EIT.2017.8053416"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Javed, A.R., Rehman, S.U., Khan, M.U., Alazab, M., Reddy, T.: CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 8(2), 1456\u20131466 (2021). https:\/\/doi.org\/10.1109\/TNSE.2021.3059881","DOI":"10.1109\/TNSE.2021.3059881"},{"issue":"6","key":"9_CR15","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016). https:\/\/doi.org\/10.1371\/journal.pone.0155781","journal-title":"PLoS ONE"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130\u2013139, October 2016. https:\/\/doi.org\/10.1109\/DSAA.2016.20","DOI":"10.1109\/DSAA.2016.20"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car (2011). https:\/\/doi.org\/10.1109\/IVS.2011.5940525","DOI":"10.1109\/IVS.2011.5940525"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 1\u201314 (2014). https:\/\/doi.org\/10.1109\/TITS.2014.2351612","DOI":"10.1109\/TITS.2014.2351612"},{"key":"9_CR19","unstructured":"Khan, Z., Chowdhury, M., Islam, M., Huang, C.-Y., Rahman, M.: Long short-term memory neural networks for false information attack detection in software-defined in-vehicle network, June 2019. http:\/\/arxiv.org\/abs\/1906.10203"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/ACCESS.2017.2782159","volume":"6","author":"G Loukas","year":"2018","unstructured":"Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491\u20133508 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2017.2782159","journal-title":"IEEE Access"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Jaynes, M., Dantu, R., Varriale, R., Evans, N.: Automating ECU identification for vehicle security (2017).  https:\/\/doi.org\/10.1109\/ICMLA.2016.53","DOI":"10.1109\/ICMLA.2016.53"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Lee, H., Choi, K., Chung, K., Kim, J., Yim, K.: Fuzzing CAN packets into automobiles. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 817\u2013821, March 2015. https:\/\/doi.org\/10.1109\/AINA.2015.274","DOI":"10.1109\/AINA.2015.274"},{"key":"9_CR23","unstructured":"Nowdehi, N., Aoudi, W., Almgren, M., Olovsson, T.: CASAD: can-aware stealthy-attack detection for in-vehicle networks, September 2019. http:\/\/arxiv.org\/abs\/1909.08407"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Murvay, P.-S., Groza, B.: DoS attacks on controller area networks by fault injections from the software layer. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u201310, August 2017. https:\/\/doi.org\/10.1145\/3098954.3103174","DOI":"10.1145\/3098954.3103174"},{"key":"9_CR25","unstructured":"Hoppe, T., Kiltz, S., Lang, A., Dittmann, J.: Exemplary automotive attack scenarios: trojan horses for electronic throttle control system (ETC) and replay attacks on the power window system, VDI Berichte, pp. 165\u2013183 (2007)"},{"key":"9_CR26","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Elsevier, Amsterdam (2009)"},{"issue":"36","key":"9_CR27","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.21105\/joss.01237","volume":"4","author":"G Lee","year":"2019","unstructured":"Lee, G., Gommers, R., Waselewski, F., Wohlfahrt, K., O\u2019Leary, A.: PyWavelets: a python package for wavelet analysis. J. Open Source Softw. 4(36), 1237 (2019). https:\/\/doi.org\/10.21105\/joss.01237","journal-title":"J. Open Source Softw."},{"key":"9_CR28","unstructured":"Taspinar, A.: A guide for using the wavelet transform in machine learning (2018). https:\/\/ataspinar.com\/"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Gers, F.A., Schraudolph, N.N., Schmidhuber, J.: CrossRef List. Deleted DOIs, vol. 1 (2000). https:\/\/doi.org\/10.1162\/153244303768966139","DOI":"10.1162\/153244303768966139"},{"key":"9_CR30","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1162\/089976600300015015","volume":"3","author":"FA Gers","year":"2000","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM. Neural Comput. 3, 115\u2013143 (2000). https:\/\/doi.org\/10.1162\/089976600300015015","journal-title":"Neural Comput."},{"key":"9_CR31","unstructured":"Hermans, M., Schrauwen, B.: Training and analyzing deep recurrent neural networks. In: Advances in Neural Information Processing Systems, 2013. Appendix: Checklist of Items to be Sent to Conference Proceedings Editors (see instructions at conference webpage), pp. 190\u2013198 (2013)"},{"issue":"21","key":"9_CR32","doi-asserted-by":"publisher","first-page":"7069","DOI":"10.3390\/s21217069","volume":"21","author":"J-N Luo","year":"2021","unstructured":"Luo, J.-N., Wu, C.-M., Yang, M.-H.: A CAN-bus lightweight authentication scheme. Sensors 21(21), 7069 (2021). https:\/\/doi.org\/10.3390\/s21217069","journal-title":"Sensors"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08819-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:04:17Z","timestamp":1655265857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08819-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031088186","9783031088193"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08819-3_9","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}