{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:44Z","timestamp":1773655544583,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-022-00451-0","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T14:27:56Z","timestamp":1663252076000},"page":"399-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Counteraction the cybersecurity threats of the in-vehicle local network"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1345-1874","authenticated-orcid":false,"given":"E. Y.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"K. V.","family":"Vasileva","sequence":"additional","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"451_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.4324\/9781003075011-10","volume-title":"Experimental Security Analysis of a Modern Automobile. The Ethics of Information Technologies","author":"K Koscher","year":"2020","unstructured":"Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. The Ethics of Information Technologies, pp. 119\u2013134. Routledge, London (2020)"},{"issue":"8","key":"451_CR2","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.3390\/s20082364","volume":"20","author":"M Bozdal","year":"2020","unstructured":"Bozdal, M., et al.: Evaluation of can bus security challenges. Sensors 20(8), 2364 (2020)","journal-title":"Sensors"},{"key":"451_CR3","unstructured":"Karahasanovic, A., Kleberger, P., Almgren, M. Adapting threat modeling methods for the automotive industry. In: Proceedings of the 15th ESCAR Conference, pp. 1\u201310 (2017)"},{"key":"451_CR4","unstructured":"Huq, N., Gibson, C., Vossele, R.: Driving security into connected cars: threat model and recommendations. https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-driving-security-into-connected-cars.pdf"},{"key":"451_CR5","first-page":"1","volume":"25","author":"S Nie","year":"2017","unstructured":"Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Brief. Black Hat USA 25, 1\u201316 (2017)","journal-title":"Brief. Black Hat USA"},{"key":"451_CR6","unstructured":"Checkoway, S. et al.: Comprehensive experimental analyses of automotive attack surfaces \/\/USENIX Security Symposium. - 2011. - Vol. 4. - P. 447-462"},{"key":"451_CR7","unstructured":"Tencent Keen Security Lab. Experimental security assessment of BMW cars: a summary report. https:\/\/keenlab.tencent.com\/en\/whitepapers\/Experimental_Security _Assessment_of_BMW_Cars_by_KeenLab.pdf"},{"key":"451_CR8","unstructured":"Miller, C., Valasek C.: Remote exploitation of an unaltered passenger vehicle. http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf"},{"key":"451_CR9","unstructured":"Barkley, J.: Role based access control on the World Wide Web. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Role-Based-Access-Control\/documents\/web_servers\/rbac-web.pdf"},{"key":"451_CR10","doi-asserted-by":"crossref","unstructured":"Hackel, T., et al.: Software-defined networks supporting time-sensitive in-vehicular communication. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/VTCSpring.2019.8746473"},{"key":"451_CR11","unstructured":"SimTime Class Reference. https:\/\/doc.omnetpp.org\/omnetpp4\/api \/classSimTime.html_details"},{"issue":"1","key":"451_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TVT.2017.2770182","volume":"67","author":"Z Sheng","year":"2017","unstructured":"Sheng, Z., et al.: Delay analysis and time-critical protocol design for in-vehicle power line communication systems. IEEE Trans. Veh. Technol. 67(1), 3\u201316 (2017)","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-022-00451-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-022-00451-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-022-00451-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T18:05:51Z","timestamp":1691777151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-022-00451-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["451"],"URL":"https:\/\/doi.org\/10.1007\/s11416-022-00451-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,15]]},"assertion":[{"value":"12 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}