{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:29Z","timestamp":1740099209957,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811330940"},{"type":"electronic","value":"9789811330957"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-3095-7_16","type":"book-chapter","created":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T21:23:28Z","timestamp":1541280208000},"page":"201-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA"],"prefix":"10.1007","author":[{"given":"Juan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haoxi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zuli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,4]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.trpro.2014.10.090","volume":"3","author":"A Kusuma","year":"2014","unstructured":"Kusuma, A., Liu, R., Choudhury, C., Montgomery, F.: Analysis of the driving behaviour at weaving section using multiple traffic surveillance data. Transp. Res. Procedia 3, 51\u201359 (2014)","journal-title":"Transp. Res. Procedia"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1016\/j.apenergy.2015.10.152","volume":"162","author":"L Li","year":"2016","unstructured":"Li, L., You, S., Yang, C., Yan, B., Song, J., Chen, Z.: Driving-behavior-aware stochastic model predictive control for plug-in hybrid electric buses. Appl. Energy 162(1), 868\u2013879 (2016)","journal-title":"Appl. Energy"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1515\/popets-2015-0029","volume":"2016","author":"M Enev","year":"2016","unstructured":"Enev, M., Takakuwa, A., Koscher, K., Kohno, T.: Automobile driver fingerprinting. Proc. Priv. Enhancing Technol. 2016(1), 34\u201350 (2016)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"16_CR4","unstructured":"Abut, H., et al.: Data collection with \u201cuyanik\u201d: too much pain; but gains are coming (2007). https:\/\/www.researchgate.net\/publication\/237728452 . Accessed 30 May 2014"},{"issue":"4","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","volume":"54","author":"B Mokhtar","year":"2015","unstructured":"Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115\u20131126 (2015)","journal-title":"Alexandria Eng. J."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Bariah, L., Shehada, D., Salahat, E., et al.: Recent advances in VANET security: a survey. In: Vehicular Technology Conference, pp. 1\u20137. IEEE Computer Society, Washington, DC (2016)","DOI":"10.1109\/VTCFall.2015.7391111"},{"issue":"5","key":"16_CR7","first-page":"95","volume":"5","author":"RS Raw","year":"2013","unstructured":"Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Netw. Secur. Appl. 5(5), 95\u2013105 (2013)","journal-title":"Int. J. Netw. Secur. Appl."},{"issue":"13","key":"16_CR8","first-page":"552","volume":"8","author":"A Sari","year":"2015","unstructured":"Sari, A., Onursal, O., Akkaya, M.: Review of the security issues in vehicular ad hoc networks (VANET). Int. J. Commun. Netw. Syst. Sci. 8(13), 552\u2013566 (2015)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Thing, V.L.L., Wu, J.: Autonomous vehicle security: a taxonomy of attacks and defences. In: 2016 IEEE International Conference on Internet of Things, pp. 164\u2013170. IEEE Computer Society, Washington, DC (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Schweppe, H., Roudier, Y.: Security and privacy for in-vehicle networks. In: International Workshop on Vehicular Communications, Sensing, and Computing. pp. 12\u201317. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/VCSC.2012.6281235"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Oguma, H., Yoshioka, A., Nishikawa, M., et al.: New attestation based security architecture for in-vehicle communication. In: Global Telecommunications Conference, pp. 1\u20136. IEEE Computer Society, Washington, DC (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.369"},{"issue":"8","key":"16_CR12","doi-asserted-by":"publisher","first-page":"2248","DOI":"10.1109\/TITS.2016.2519464","volume":"17","author":"S Woo","year":"2016","unstructured":"Woo, S., Jo, H.J., Kim, I.S., et al.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248\u20132261 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"16_CR13","unstructured":"Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of the 25th USENIX Security Symposium, pp. 911\u2013927. USENIX Association, Berkeley (2016)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Jaynes, M., Dantu, R., Varriale, R., et al.: Automating ECU identification for vehicle security. In: IEEE International Conference on Machine Learning and Applications, pp. 632\u2013635. IEEE Computer Society, Washington, DC (2017)","DOI":"10.1109\/ICMLA.2016.0111"},{"issue":"6","key":"16_CR15","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"1","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 1(6), e0155781 (2016)","journal-title":"PLoS One"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: Vehicular Technology Conference. pp. 1\u20135, IEEE Computer Society, Washington, DC (2016)","DOI":"10.1109\/VTCSpring.2016.7504089"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/01969722.2016.1276780","volume":"48","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Li, F., Wang, J., et al.: Adding intelligence to cars using the neural knowledge DNA. Cybern. Syst. 48(3), 267\u2013273 (2017)","journal-title":"Cybern. Syst."},{"issue":"2","key":"16_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.4018\/jeis.2006040104","volume":"2","author":"C San\u00edn","year":"2006","unstructured":"San\u00edn, C., Szczerbicki, E.: Using set of experience in the process of transforming information into knowledge. Int. J. Enterp. Inf. Syst. 2(2), 45\u201362 (2006)","journal-title":"Int. J. Enterp. Inf. Syst."},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1080\/01969720701601189","volume":"38","author":"C San\u00edn","year":"2007","unstructured":"San\u00edn, C., Szczerbicki, E.: Towards the construction of decisional DNA: a set of experience knowledge structure java class within an ontology system. Cybern. Syst. 38, 859\u2013878 (2007)","journal-title":"Cybern. Syst."},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1080\/01969722.2016.1276771","volume":"3","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Li, F., Wang, J., et al.: Experience-oriented intelligence for Internet of Things. Cybern. Syst. 3, 162\u2013181 (2017)","journal-title":"Cybern. Syst."},{"key":"16_CR21","unstructured":"Valasek, C., Miller, C.: Adventures in automotive networks and control units. Technical White Paper, 99 (2013). http:\/\/www.ioactive.com\/pdfs\/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3095-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T05:17:52Z","timestamp":1662355072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3095-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811330940","9789811330957"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3095-7_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chendu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scse.uestc.edu.cn\/fcs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}