{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:24Z","timestamp":1767337884611,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976445","type":"print"},{"value":"9783031976452","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97645-2_19","type":"book-chapter","created":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T09:57:55Z","timestamp":1751709475000},"page":"285-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Risks in\u00a0Connected Vehicles: Profiling Threats and\u00a0Mitigation Strategies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6514-4168","authenticated-orcid":false,"given":"Marco","family":"De Santis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0085-0748","authenticated-orcid":false,"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6415-1180","authenticated-orcid":false,"given":"Michele","family":"Mastroianni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TIV.2023.3326736","volume":"9","author":"A Abdo","year":"2023","unstructured":"Abdo, A., Chen, H., Zhao, X., Wu, G., Feng, Y.: Cybersecurity on connected and automated transportation systems: a survey. IEEE Trans. Intell. Veh. 9(1), 1382\u20131401 (2023)","journal-title":"IEEE Trans. Intell. Veh."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Aljzaere, H.S.J., Kaladi, R.K., Hardt, W.: Analysis of privacy risks of vehicle telematics. In: 2024 International Conference on Computing, Internet of Things and Microwave Systems (ICCIMS), pp.\u00a01\u20133. IEEE (2024)","DOI":"10.1109\/ICCIMS61672.2024.10690430"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comnet.2018.12.018","volume":"151","author":"A Alnasser","year":"2019","unstructured":"Alnasser, A., Sun, H., Jiang, J.: Cyber security challenges and solutions for V2X communications: a survey. Comput. Netw. 151, 52\u201367 (2019)","journal-title":"Comput. Netw."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bella, G., Biondi, P., Tudisco, G.: A double assessment of privacy risks aboard top-selling cars. Automot. Innov. 1, 1\u201318 (2023)","DOI":"10.1007\/s42154-022-00203-2"},{"issue":"5","key":"19_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/jsan13050063","volume":"13","author":"J Carlton","year":"2024","unstructured":"Carlton, J., Malik, H.: Safeguarding personal identifiable information (PII) after smartphone pairing with a connected vehicle. J. Sens. Actuator Netw. 13(5), 63 (2024)","journal-title":"J. Sens. Actuator Netw."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"De\u00a0Vincenzi, M., Moore, J., Smith, B., Sarma, S.E., Matteucci, I.: Security risks and designs in the connected vehicle ecosystem: in-vehicle and edge platforms. IEEE Open J. Veh. Technol. (2024)","DOI":"10.1109\/OJVT.2024.3524088"},{"key":"19_CR7","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/978-3-030-22354-0_78","volume-title":"Complex, Intelligent, and Software Intensive Systems","author":"B Di Martino","year":"2020","unstructured":"Di Martino, B., Mastroianni, M., Campaiola, M., Morelli, G., Sparaco, E.: Semantic techniques for validation of GDPR compliance of business processes. In: Barolli, L., Hussain, F.K., Ikeda, M. (eds.) CISIS 2019. AISC, vol. 993, pp. 847\u2013855. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22354-0_78"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"14752","DOI":"10.1109\/ACCESS.2023.3243906","volume":"11","author":"S Ghosh","year":"2023","unstructured":"Ghosh, S., Zaboli, A., Hong, J., Kwon, J.: An integrated approach of threat analysis for autonomous vehicles perception system. IEEE Access 11, 14752\u201314777 (2023)","journal-title":"IEEE Access"},{"issue":"1","key":"19_CR9","first-page":"6873273","volume":"2020","author":"Q He","year":"2020","unstructured":"He, Q., Meng, X., Qu, R.: Towards a severity assessment method for potential cyber attacks to connected and autonomous vehicles. J. Adv. Transp. 2020(1), 6873273 (2020)","journal-title":"J. Adv. Transp."},{"key":"19_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103674","volume":"166","author":"S Hossain","year":"2025","unstructured":"Hossain, S., Senouci, S.M., Brik, B., Boualouache, A.: A privacy-preserving self-supervised learning-based intrusion detection system for 5G\u2013V2X networks. Ad Hoc Netw. 166, 103674 (2025)","journal-title":"Ad Hoc Netw."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Li, H., Ma, D., Medjahed, B., Kim, Y.S., Mitra, P.: Analyzing and preventing data privacy leakage in connected vehicle services. SAE Int. J. Adv. Current Pract. Mob. 1(2019-01-0478), 1035\u20131045 (2019)","DOI":"10.4271\/2019-01-0478"},{"key":"19_CR12","volume":"37","author":"T Limbasiya","year":"2022","unstructured":"Limbasiya, T., Teng, K.Z., Chattopadhyay, S., Zhou, J.: A systematic survey of attack detection and prevention in connected and autonomous vehicles. Veh. Commun. 37, 100515 (2022)","journal-title":"Veh. Commun."},{"key":"19_CR13","doi-asserted-by":"publisher","unstructured":"Mastroianni, M., Palmieri, F., Ficco, M., Kozik, R., Chora\u015b, M.: Privacy risk analysis and metrics in capturing and storing network traffic. In: 2023 24th International Conference on Control Systems and Computer Science (CSCS), pp. 580\u2013585 (2023). https:\/\/doi.org\/10.1109\/CSCS59211.2023.00097","DOI":"10.1109\/CSCS59211.2023.00097"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Panda, J., Jain, R.D.: Cyber security challenges in V2C and in vehicle network. Technical report, SAE Technical Paper (2024)","DOI":"10.4271\/2024-28-0035"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Panda, S., Panaousis, E., Loukas, G., Kentrotis, K.: Privacy impact assessment of cyber attacks on connected and autonomous vehicles. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp.\u00a01\u20139 (2023)","DOI":"10.1145\/3600160.3605073"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Pes\u00e9, M.D., Shin, K.G.: Survey of automotive privacy regulations and privacy-related attacks. SAE Technical Paper (2019)","DOI":"10.4271\/2019-01-0479"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Stingelov\u00e1, B., Thrakl, C.T., Wro\u0144ska, L., Jedrej-Szymankiewicz, S., Khan, S., Svetinovic, D.: User-centric security and privacy threats in connected vehicles: a threat modeling analysis using stride and LINDDUN. In: 2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 0690\u20130697. IEEE (2023)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361381"},{"issue":"6","key":"19_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCE.2021.3092303","volume":"11","author":"X Wu","year":"2021","unstructured":"Wu, X., Xu, X., Bilal, M.: Toward privacy protection composition framework on internet of vehicles. IEEE Consum. Electron. Mag. 11(6), 32\u201338 (2021)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"9","key":"19_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558052","volume":"55","author":"T Yoshizawa","year":"2023","unstructured":"Yoshizawa, T., et al.: A survey of security and privacy issues in V2X communication systems. ACM Comput. Surv. 55(9), 1\u201336 (2023)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2025 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97645-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T09:57:59Z","timestamp":1751709479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97645-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"ISBN":["9783031976445","9783031976452"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97645-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"28 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}