{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:54:14Z","timestamp":1770155654655,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_14","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:01Z","timestamp":1770109081000},"page":"231-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-Based Approach"],"prefix":"10.1007","author":[{"given":"Lucien Kiven","family":"Tamo","sequence":"first","affiliation":[]},{"given":"Brooke","family":"Kidmose","sequence":"additional","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"14_CR1","unstructured":"Automotive electronic control unit market - size, share & industry analysis. https:\/\/www.fortunebusinessinsights.com\/industry-reports\/automotive-electronic-control-unit-ecu-market-101595. Accessed Sep 2024"},{"key":"14_CR2","unstructured":"Cyber attacks shift gears: The growing threat to automotive technology. https:\/\/www.nada.org\/nada\/nada-headlines\/cyber-attacks-shift-gears-growing-threat-automotive-technology. Accessed Jul 2024"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Alnabulsi, H., Islam, M.R.: Protecting code injection attacks in intelligent transportation system. In: TrustCom\/BigDataSE 2019, pp. 799\u2013806 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00116"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MNET.2024.3367303","volume":"38","author":"L Du","year":"2024","unstructured":"Du, L., Gu, Z., Wang, Y., Gao, C.: Open world intrusion detection: an open set recognition method for CAN bus in intelligent connected vehicles. IEEE Netw. 38(3), 76\u201382 (2024)","journal-title":"IEEE Netw."},{"key":"14_CR5","volume":"50","author":"H Kang","year":"2024","unstructured":"Kang, H., Vo, T., Kim, H.K., Hong, J.B.: CANival: a multimodal approach to intrusion detection on the vehicle CAN bus. Veh. Commun. 50, 100845 (2024)","journal-title":"Veh. Commun."},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/TITS.2020.3025685","volume":"23","author":"R Islam","year":"2022","unstructured":"Islam, R., Refat, R.U.D., Yerram, S.M., Malik, H.: Graph-based intrusion detection system for controller area networks. IEEE Trans. Intell. Transp. Syst. 23(3), 1727\u20131736 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"14_CR7","unstructured":"Lampe, B.: can-dataset (2023). https:\/\/bitbucket.org\/brooke-lampe\/can-dataset\/src\/master\/"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Lampe, B.: can-train-and-test-v1.5 (2023). https:\/\/bitbucket.org\/brooke-lampe\/can-train-and-test-v1.5\/src\/master\/","DOI":"10.1109\/VTC2023-Fall60731.2023.10333756"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Lampe, B., Meng, W.: IDS for CAN: a practical intrusion detection system for CAN bus security. In: GLOBECOM 2022, pp. 1782\u20131787 (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001536"},{"issue":"4","key":"14_CR10","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1109\/COMST.2023.3309864","volume":"25","author":"B Lampe","year":"2023","unstructured":"Lampe, B., Meng, W.: Intrusion detection in the automotive domain: a comprehensive review. IEEE Commun. Surv. Tutorials 25(4), 2356\u20132426 (2023)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR11","volume":"51","author":"B Kidmose","year":"2025","unstructured":"Kidmose, B.: A review of smart vehicles in smart cities: dangers, impacts, and the threat landscape. Veh. Commun. 51, 100871 (2025)","journal-title":"Veh. Commun."},{"key":"14_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103777","volume":"140","author":"B Lampe","year":"2024","unstructured":"Lampe, B., Meng, W.: can-train-and-test: a curated CAN dataset for automotive intrusion detection. Comput. Secur. 140, 103777 (2024)","journal-title":"Comput. Secur."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Lampe, B., Meng, W.: Can-logic: automotive intrusion detection via temporal logic. In: IoT \u201923, pp. 113\u2013120 (2023)","DOI":"10.1145\/3627050.3627059"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Kidmose, B., Meng, W.: Can-FP: an attack-aware analysis of false alarms in automotive intrusion detection models. In: PST 2024, pp. 1\u201312 (2024)","DOI":"10.1109\/PST62714.2024.10788039"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Kidmose, B., Kidmose, A., Meng, W.: Can-sleuth: sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets. Int. J. Inf. Secur. (2025)","DOI":"10.1007\/s10207-025-01038-8"},{"issue":"2","key":"14_CR16","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/TNSM.2020.3038991","volume":"18","author":"S Longari","year":"2021","unstructured":"Longari, S., Valcarcel, D.H.N., Zago, M., Carminati, M., Zanero, S.: CANnolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans. Netw. Serv. Manag. 18(2), 1913\u20131924 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.cose.2016.04.007","volume":"60","author":"W Li","year":"2016","unstructured":"Li, W., Meng, W., Luo, X., Kwok, L.F.: MVPSys: towards practical multi-view based false alarm reduction system in network intrusion detection. Comput. Secur. 60, 177\u2013192 (2016)","journal-title":"Comput. Secur."},{"issue":"1","key":"14_CR18","doi-asserted-by":"publisher","first-page":"6530","DOI":"10.1109\/ACCESS.2018.2794685","volume":"6","author":"W Li","year":"2018","unstructured":"Li, W., Meng, W., Su, C., Kwok, L.F.: False alarm reduction using fuzzy if-then rules for medical cyber physical systems. IEEE Access 6(1), 6530\u20136539 (2018)","journal-title":"IEEE Access"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Li, W., Stidsen, C., Adam, T.: A blockchain-assisted security management framework for collaborative intrusion detection in smart cities. Comput. Electr. Eng 111(Part A, 108884), 1\u201313 (2023)","DOI":"10.1016\/j.compeleceng.2023.108884"},{"key":"14_CR20","first-page":"43","volume":"9","author":"M Markovitz","year":"2017","unstructured":"Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43\u201352 (2017)","journal-title":"Veh. Commun."},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/MCE.2021.3137790","volume":"12","author":"D Man","year":"2023","unstructured":"Man, D., Zeng, F., Lv, J., Xuan, S., Yang, W., Guizani, M.: AI-based intrusion detection for intelligence internet of vehicles. IEEE Consumer Electron. Mag. 12(1), 109\u2013116 (2023)","journal-title":"IEEE Consumer Electron. Mag."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D.: Anomaly detection of CAN bus messages through analysis of ID sequences. In: 2017 Intelligent Vehicles Symposium (IV), pp. 1577\u20131583 (2017)","DOI":"10.1109\/IVS.2017.7995934"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Meng, Y., Kwok, L.F.: Towards an information-theoretic approach for measuring intelligent false alarm reduction in intrusion detection. In: The 12th TrustCom, IEEE, pp. 241\u2013248 (2013)","DOI":"10.1109\/TrustCom.2013.33"},{"key":"14_CR24","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. In: Black Hat USA (2014)"},{"key":"14_CR25","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA (2015)"},{"key":"14_CR26","unstructured":"Miller, C., Valasek, C.: Advanced CAN injection techniques for vehicle networks. In: Black Hat USA (2016)"},{"key":"14_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103847","volume":"142","author":"J Song","year":"2024","unstructured":"Song, J., Qin, G., Liang, Y., Yan, J., Sun, M.: SIDiLDNG: a similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN. Comput. Secur. 142, 103847 (2024)","journal-title":"Comput. Secur."},{"issue":"11","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570954","volume":"55","author":"S Rajapaksha","year":"2023","unstructured":"Rajapaksha, S., Kalutarage, H.K., Al-Kadri, M.O., Petrovski, A., Madzudzo, G., Cheah, M.: AI-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput. Surv. 55(11), 1\u201340 (2023)","journal-title":"ACM Comput. Surv."},{"key":"14_CR29","unstructured":"Hartwich, F.: Introducing CAN XL into CAN networks. In: International CAN Conference (iCC) (2020)"},{"issue":"17","key":"14_CR30","doi-asserted-by":"publisher","first-page":"15593","DOI":"10.1109\/JIOT.2022.3151377","volume":"9","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Xun, Y., Liu, J.: ClockIDS: a real-time vehicle intrusion detection system based on clock skew. IEEE Internet Things J. 9(17), 15593\u201315606 (2022)","journal-title":"IEEE Internet Things J."},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y., Xue, H.: Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 31(19) (2019)","DOI":"10.1002\/cpe.5101"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"H. Lee, S.H. Jeong, H.K. Kim. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame. In: PST 2017: 57-66 (2017)","DOI":"10.1109\/PST.2017.00017"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:06Z","timestamp":1770109086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}