{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:13:20Z","timestamp":1743142400164,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031473272"},{"type":"electronic","value":"9783031473289"}],"license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47328-9_35","type":"book-chapter","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:02:58Z","timestamp":1698688978000},"page":"484-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["$$\\textsc {IVE}$$: An Immersive Virtual Environment for\u00a0Automotive Security Exploration"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9874-0848","authenticated-orcid":false,"given":"Richard","family":"Owoputi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8251-4368","authenticated-orcid":false,"given":"Md Rafiul","family":"Kabir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8671-5052","authenticated-orcid":false,"given":"Sandip","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.compeleceng.2017.08.023","volume":"65","author":"D Bhattacharjee","year":"2018","unstructured":"Bhattacharjee, D., Paul, A., Kim, J.H., Karthigaikumar, P.: An immersive learning model using evolutionary learning. Comput. Electr. Eng. 65, 236\u2013249 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Cao, Y., et al.: Adversarial sensor attack on lidar-based perception in autonomous driving. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2267\u20132281 (2019)","DOI":"10.1145\/3319535.3339815"},{"key":"35_CR3","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: 20th USENIX Security Symposium (USENIX Security 11) (2011)"},{"key":"35_CR4","unstructured":"Haas, J.K.: A history of the unity game engine (2014)"},{"issue":"1","key":"35_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40692-020-00169-2","volume":"8","author":"D Hamilton","year":"2021","unstructured":"Hamilton, D., McKechnie, J., Edgerton, E., Wilson, C.: Immersive virtual reality as a pedagogical tool in education: a systematic literature review of quantitative learning outcomes and experimental design. J. Comput. Educ. 8(1), 1\u201332 (2021)","journal-title":"J. Comput. Educ."},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"issue":"3","key":"35_CR7","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1002\/cae.20424","volume":"20","author":"JS Liang","year":"2012","unstructured":"Liang, J.S.: Modeling an immersive VR driving learning platform in a web-based collaborative design environment. Comput. Appl. Eng. Educ. 20(3), 553\u2013567 (2012)","journal-title":"Comput. Appl. Eng. Educ."},{"key":"35_CR8","doi-asserted-by":"publisher","unstructured":"Lim, B.S., Keoh, S.L., Thing, V.L.L.: Autonomous vehicle ultrasonic sensor vulnerability and impact assessment. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 231\u2013236 (2018). https:\/\/doi.org\/10.1109\/WF-IoT.2018.8355132","DOI":"10.1109\/WF-IoT.2018.8355132"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.3389\/fpsyg.2018.02364","volume":"9","author":"DM Markowitz","year":"2018","unstructured":"Markowitz, D.M., Laha, R., Perone, B.P., Pea, R.D., Bailenson, J.N.: Immersive virtual reality field trips facilitate learning about climate change. Front. Psychol. 9, 2364 (2018)","journal-title":"Front. Psychol."},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.compedu.2013.07.033","volume":"70","author":"Z Merchant","year":"2014","unstructured":"Merchant, Z., Goetz, E.T., Cifuentes, L., Keeney-Kennicutt, W., Davis, T.J.: Effectiveness of virtual reality-based instruction on students\u2019 learning outcomes in k-12 and higher education: a meta-analysis. Comput. Educ. 70, 29\u201340 (2014)","journal-title":"Comput. Educ."},{"issue":"4","key":"35_CR11","first-page":"860","volume":"2","author":"F Milella","year":"2015","unstructured":"Milella, F.: Problem-solving by immersive virtual reality: towards a more efficient product emergence process in automotive. J. Multidisc. Eng. Sci. Technol. (JMEST) 2(4), 860\u2013867 (2015)","journal-title":"J. Multidisc. Eng. Sci. Technol. (JMEST)"},{"key":"35_CR12","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. black hat USA 2014, 94 (2014)"},{"key":"35_CR13","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91) (2015)"},{"key":"35_CR14","unstructured":"Peppler, K., Kafai, Y.: What videogame making can teach us about literacy and learning: Alternative pathways into participatory culture (2007)"},{"issue":"2","key":"35_CR15","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/s17020271","volume":"17","author":"F de Ponte M\u00fcller","year":"2017","unstructured":"de Ponte M\u00fcller, F.: Survey on ranging sensors and cooperative techniques for relative positioning of vehicles. Sensors 17(2), 271 (2017)","journal-title":"Sensors"},{"key":"35_CR16","unstructured":"Stottelaar, B.G.: Practical cyber-attacks on autonomous vehicles. Master\u2019s thesis, University of Twente (2015)"},{"key":"35_CR17","unstructured":"Struyf, D., Willems, S.: A pilot study on the use of immersive technologies in the teaching of automotive technology students. In: BAPS 2019, Date: 2019\/05\/13-2019\/05\/14, Location: Li\u00e8ge, pp. 64\u201364 (2019)"},{"key":"35_CR18","unstructured":"Sun, J.S., Cao, Y.C., Chen, Q.A., Mao, Z.M.: Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In: USENIX Security Symposium (Usenix Security\u201920) (2020)"},{"issue":"3","key":"35_CR19","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","volume":"21","author":"F Van Wyk","year":"2019","unstructured":"Van Wyk, F., Wang, Y., Khojandi, A., Masoud, N.: Real-time sensor anomaly detection and identification in automated vehicles. IEEE Trans. Intell. Transp. Syst. 21(3), 1264\u20131276 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"6","key":"35_CR20","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.1109\/JIOT.2018.2867917","volume":"5","author":"W Xu","year":"2018","unstructured":"Xu, W., Yan, C., Jia, W., Ji, X., Liu, J.: Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE Internet Things J. 5(6), 5015\u20135029 (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2867917","journal-title":"IEEE Internet Things J."},{"issue":"22","key":"35_CR21","doi-asserted-by":"publisher","first-page":"22357","DOI":"10.1109\/JIOT.2021.3101502","volume":"9","author":"T Yang","year":"2021","unstructured":"Yang, T., Lv, C.: A secure sensor fusion framework for connected and automated vehicles under sensor attacks. IEEE Internet Things J. 9(22), 22357\u201322365 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"35_CR22","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/JIOT.2020.3011690","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang, J., et al.: Detecting and identifying optical signal attacks on autonomous driving systems. IEEE Internet Things J. 8(2), 1140\u20131153 (2020)","journal-title":"IEEE Internet Things J."}],"container-title":["Communications in Computer and Information Science","Immersive Learning Research Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47328-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:06:57Z","timestamp":1698689217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47328-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"ISBN":["9783031473272","9783031473289"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47328-9_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"31 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iLRN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Immersive Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Luis Obispo, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icil2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.immersivelrn.org\/ilrn2023\/home-ilrn2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}