{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:33:56Z","timestamp":1743136436273,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031368882"},{"type":"electronic","value":"9783031368899"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36889-9_12","type":"book-chapter","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T21:01:50Z","timestamp":1689454910000},"page":"151-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing Security of\u00a0Internal Vehicle Networks"],"prefix":"10.1007","author":[{"given":"Anas","family":"Alkoutli","sequence":"first","affiliation":[]},{"given":"Joakim","family":"Anderlind","sequence":"additional","affiliation":[]},{"given":"Carl-Johan","family":"Bj\u00f6rnson","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Drage","sequence":"additional","affiliation":[]},{"given":"Morgan","family":"Thowsen","sequence":"additional","affiliation":[]},{"given":"Antonia","family":"Welzel","sequence":"additional","affiliation":[]},{"given":"Miroslaw","family":"Staron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,16]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65939-4","volume-title":"Automotive Software Architectures","author":"M Staron","year":"2021","unstructured":"Staron, M.: Automotive Software Architectures. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-65939-4"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Sagstetter, F., et al.: Security challenges in automotive hardware\/software architecture design. In: 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 458\u2013463. IEEE (2013)","DOI":"10.7873\/DATE.2013.102"},{"key":"12_CR3","series-title":"Lecture Notes in Mobility","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-19818-7_2","volume-title":"Energy Consumption and Autonomous Driving","author":"S Bayer","year":"2016","unstructured":"Bayer, S., Enderle, T., Oka, D.-K., Wolf, M.: Automotive security testing\u2014the digital crash test. In: Langheim, J. (ed.) Energy Consumption and Autonomous Driving. LNM, pp. 13\u201322. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-19818-7_2"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-642-39259-7_26","volume-title":"Product-Focused Software Process Improvement","author":"R Rana","year":"2013","unstructured":"Rana, R., et al.: Evaluation of standard reliability growth models in the context of automotive software systems. In: Heidrich, J., Oivo, M., Jedlitschka, A., Baldassarre, M.T. (eds.) PROFES 2013. LNCS, vol. 7983, pp. 324\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39259-7_26"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"148","DOI":"10.3390\/info10040148","volume":"10","author":"F Sommer","year":"2019","unstructured":"Sommer, F., D\u00fcrrwang, J., Kriesten, R.: Survey and classification of automotive security attacks. Information 10(4), 148 (2019)","journal-title":"Information"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, July 2010. https:\/\/doi.org\/10.1109\/sp.2010.34","DOI":"10.1109\/sp.2010.34"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Buttigieg, R., Farrugia, M., Meli, C.: Security issues in controller area networks in automobiles. In: 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 93\u201398, 2017. https:\/\/doi.org\/10.1109\/STA.2017.8314877","DOI":"10.1109\/STA.2017.8314877"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Nowdehi, N., Lautenbach, A., Olovsson, T.: In-vehicle can message authentication: an evaluation based on industrial criteria. In: 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), pp. 1\u20137 (2017). https:\/\/doi.org\/10.1109\/VTCFall.2017.8288327","DOI":"10.1109\/VTCFall.2017.8288327"},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1109\/SURV.2012.121112.00190","volume":"15","author":"T Kiravuo","year":"2013","unstructured":"Kiravuo, T., Sarela, M., Manner, J.: A survey of ethernet LAN security. IEEE Commun. Surv. Tutor. 15(3), 1477\u20131491 (2013). https:\/\/doi.org\/10.1109\/SURV.2012.121112.00190","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"12_CR10","unstructured":"Corbett, C., Schoch, E., Kargl, F., Preussner, F.: Automotive ethernet: Security opportunity or challenge? Sicherheit 2016 - Sicherheit, Schutz und Zuverl\u00e4ssigkeit (2016)"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Staron, M.: Action Research in Software Engineering. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-32610-4","DOI":"10.1007\/978-3-030-32610-4"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A Hevner","year":"2004","unstructured":"Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. Manag. Inf. Syst. Q. 28(1), 75\u2013105 (2004)","journal-title":"Manag. Inf. Syst. Q."},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Staron, M., Meding, W.: Software Development Measurement Programs. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91836-5","DOI":"10.1007\/978-3-319-91836-5"},{"key":"12_CR14","unstructured":"INTERNET PROTOCOL. RFC 791, University of Southern California, September 1981. https:\/\/tools.ietf.org\/html\/rfc791.html"},{"issue":"4","key":"12_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/964661.800902","volume":"13","author":"R Popescu-Zeletin","year":"1983","unstructured":"Popescu-Zeletin, R.: Implementing the ISO-OSI reference model. ACM SIGCOMM Comput. Commun. Rev. 13(4), 56\u201366 (1983)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"12_CR16","unstructured":"Use private wi-fi addresses in ios 14, ipados 14 and watchos 7. https:\/\/web.archive.org\/web\/20210424120018\/support.apple.com\/en-gb\/HT211227"},{"key":"12_CR17","unstructured":"Differences between tls 1.2 and tls 1.3. https:\/\/web.archive.org\/web\/20190919000200\/www.wolfssl.com\/differences-between-tls-12-and-tls-13-9\/"}],"container-title":["Lecture Notes in Computer Science","Software Architecture. ECSA 2022 Tracks and Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36889-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T21:03:14Z","timestamp":1689454994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36889-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031368882","9783031368899"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36889-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ecsa-2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 tutorial papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}