{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:02Z","timestamp":1742913842588,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840999"},{"type":"electronic","value":"9783031841002"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84100-2_1","type":"book-chapter","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T23:59:47Z","timestamp":1741391987000},"page":"3-10","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Embedded Anomaly Detection System for\u00a0In-Vehicle Networking Cybersecurity"],"prefix":"10.1007","author":[{"given":"Sara","family":"Visconti","sequence":"first","affiliation":[]},{"given":"Ettore","family":"Soldaini","sequence":"additional","affiliation":[]},{"given":"Pierpaolo","family":"Dini","sequence":"additional","affiliation":[]},{"given":"Abdussalam","family":"Elhanashi","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Saponara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,8]]},"reference":[{"issue":"12","key":"1_CR1","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.3390\/electronics13122322","volume":"13","author":"P Dini","year":"2024","unstructured":"Dini, P., Diana, L., Elhanashi, A., & Saponara, S. (2024). Overview of AI-Models and Tools in Embedded IIoT Applications. Electronics, 13(12), 2322.","journal-title":"Electronics"},{"issue":"24","key":"1_CR2","doi-asserted-by":"publisher","first-page":"4925","DOI":"10.3390\/electronics12244925","volume":"12","author":"A Elhanashi","year":"2023","unstructured":"Elhanashi, A., Dini, P., Saponara, S., & Zheng, Q. (2023). Integration of deep learning into the iot: A survey of techniques and challenges for real-world applications. Electronics, 12(24), 4925.","journal-title":"Electronics"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/designs5010009","volume":"5","author":"P Dini","year":"2021","unstructured":"Dini, P., & Saponara, S. (2021). Analysis, design, and comparison of machine-learning techniques for networking intrusion detection. Designs, 5(1), 9.","journal-title":"Designs"},{"issue":"13","key":"1_CR4","doi-asserted-by":"publisher","first-page":"7507","DOI":"10.3390\/app13137507","volume":"13","author":"P Dini","year":"2023","unstructured":"Dini, P., Elhanashi, A., Begni, A., Saponara, S., Zheng, Q., & Gasmi, K. (2023). Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity. Applied Sciences, 13(13), 7507.","journal-title":"Appl. Sci."},{"key":"1_CR5","unstructured":"Rosadini, C., Chiarelli, S., Cornelio, A., Nesci, W., Saponara, S., Dini, P., & Gagliardi, A. (2023). U.S. Patent Application No. 18\/163,488."},{"key":"1_CR6","unstructured":"Rosadini, C., Chiarelli, S., Nesci, W., Saponara, S., Gagliardi, A., & Dini, P. (2023). U.S. Patent Application No. 17\/929,370."},{"issue":"8","key":"1_CR7","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.3390\/s20082364","volume":"20","author":"M Bozdal","year":"2020","unstructured":"Bozdal, M., Samie, M., Aslam, S., & Jennions, I. (2020). Evaluation of can bus security challenges. Sensors, 20(8), 2364.","journal-title":"Sensors"},{"issue":"15","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.3390\/electronics10151765","volume":"10","author":"F Pascale","year":"2021","unstructured":"Pascale, F., Adinolfi, E. A., Coppola, S., & Santonicola, E. (2021). Cybersecurity in automotive: An intrusion detection system in connected vehicles. Electronics, 10(15), 1765.","journal-title":"Electronics"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1484-3","volume":"2019","author":"S-F Lokman","year":"2019","unstructured":"Lokman, S. F., Othman, A. T., & AbuBakar, M. H. (2019). Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP Jour-nal on Wireless Communications and Networking, 2019(1), 1-17.","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"67910","DOI":"10.1109\/ACCESS.2022.3186026","volume":"10","author":"P Dini","year":"2022","unstructured":"Dini, P., Begni, A., Ciavarella, S., De Paoli, E., Fiorelli, G., Silvestro, C., & Saponara, S. (2022). Design and testing novel one-class classifier based on polynomial interpolation with application to networking security. IEEE Access, 10, 67910-67924.","journal-title":"IEEE Access"},{"issue":"22","key":"1_CR11","doi-asserted-by":"publisher","first-page":"9231","DOI":"10.3390\/s23229231","volume":"23","author":"P Dini","year":"2023","unstructured":"Dini, P., & Saponara, S. (2023). Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity. Sensors, 23(22), 9231.","journal-title":"Sensors"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Li, D., Tian, M., Jiang, R., & Yang, K. (2021, July). Exploiting temperature-varied voltage fingerprints for in-vehicle CAN intrusion detection. In Proceedings of the ACM Turing Award Celebration Conference-China (pp. 116-120).","DOI":"10.1145\/3472634.3472662"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Yin, L., Xu, J., Wang, C., Wang, Q., & Zhou, F. (2023). Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system. Journal of Systems Architecture, 143, 102957.","DOI":"10.1016\/j.sysarc.2023.102957"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Santos, I., & Balzarotti, D. (2018, October). Clock around the clock: Time-based device fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1502-1514).","DOI":"10.1145\/3243734.3243796"},{"issue":"17","key":"1_CR15","doi-asserted-by":"publisher","first-page":"15593","DOI":"10.1109\/JIOT.2022.3151377","volume":"9","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Xun, Y., & Liu, J. (2022). ClockIDS: A real-time vehicle intrusion detection system based on clock skew. IEEE Internet of Things Journal, 9(17), 15593-15606.","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Electrical Engineering","Applications in Electronics Pervading Industry, Environment and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84100-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T23:59:51Z","timestamp":1741391991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84100-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840999","9783031841002"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84100-2_1","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ApplePies","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications in Electronics Pervading Industry, Environment and Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"applepies2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}