{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:08:49Z","timestamp":1775099329806,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N01300X\/1"],"award-info":[{"award-number":["EP\/N01300X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012338","name":"Alan Turing Institute","doi-asserted-by":"publisher","award":["EP\/N510129\/1"],"award-info":[{"award-number":["EP\/N510129\/1"]}],"id":[{"id":"10.13039\/100012338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2894183","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:58:55Z","timestamp":1550174335000},"page":"21266-21289","source":"Crossref","is-referenced-by-count":163,"title":["Intrusion Detection Systems for Intra-Vehicle Networks: A Review"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6212-9307","authenticated-orcid":false,"given":"Omar Y.","family":"Al-Jarrah","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Dianati","sequence":"additional","affiliation":[]},{"given":"David","family":"Oxtoby","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Mouzakitis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","author":"zamani","year":"2013","journal-title":"Machine Learning Techniques for Intrusion Detection"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626252"},{"key":"ref71","doi-asserted-by":"crossref","DOI":"10.1201\/b15088","author":"bhattacharyya","year":"2013","journal-title":"Network Anomaly Detection A Machine Learning Perspective"},{"key":"ref70","first-page":"37","article-title":"Evaluation: From predcision, recall and F-factor to ROC, informedness, markedness & correlation","volume":"2","author":"powers","year":"2011","journal-title":"J Mach Learn Technol"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"ref77","doi-asserted-by":"crossref","DOI":"10.1201\/b10867","author":"dua","year":"2016","journal-title":"Data Mining and Machine Learning in Cybersecurity"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.05.002"},{"key":"ref39","first-page":"23","article-title":"Anomaly detection in recordongs from in-vehicle networks","author":"theissler","year":"2014","journal-title":"Proc 1st Int Workshop Big Data Appl Princ (BIGDAP)"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/DNSR.2004.1344728"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref79","first-page":"829","article-title":"Results of the DARPA 1998 offline intrusion detection evaluation","volume":"99","author":"lippmann","year":"1999","journal-title":"Recent Adv in Intrusion Detection"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511098"},{"key":"ref32","first-page":"21","article-title":"Context-aware intrusion detection in automotive control system","author":"wasicek","year":"2017","journal-title":"Proc 5th ESCAR USA Conf"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2017.67"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref36","first-page":"1","article-title":"Intrusion prevention system of automotive network CAN bus","author":"abbott-mccune","year":"2016","journal-title":"Proc IEEE Int Carnahan Conf Security Technol (ICCST)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC-CSS.2016.017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2490802"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.dcan.2017.09.009","article-title":"Semi-supervised multi-layered clustering model for intrusion detection","volume":"4","author":"al-jarrah","year":"2017","journal-title":"Digit Commun Netw"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref28","article-title":"Physical-fingerprinting of electronic control unit (ECU) based on machine learning algorithm for in-vehicle network communication protocol &#x2018;CAN-BUS","author":"avatefipour","year":"2017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/VCSC.2012.6281235"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023741"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.1201\/EBK1439819197","author":"pathan","year":"2016","journal-title":"Security of Self-Organizing Networks MANET WSN WMN VANET"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700364"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1109\/JSYST.2013.2257594","article-title":"Intrusion detection in cyber-physical systems: Techniques and challenges","volume":"8","author":"han","year":"2014","journal-title":"IEEE Syst J"},{"key":"ref20","first-page":"226","article-title":"Applying intrusion detection to automotive IT-early insights and remaining challenges","volume":"4","author":"hoppe","year":"2009","journal-title":"Journal of Info Assurance and Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2991\/citcs.2012.161"},{"key":"ref24","first-page":"37","article-title":"Towards a fail-operational intrusion detection system for in-vehicle networks","author":"young","year":"2016","journal-title":"Proc 1st Workshop on Security and Dependability of Critical Embedded Real-Time Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref25","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.20"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"ref58","author":"witten","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref57","first-page":"1","article-title":"A two-stage deep learning approach for can intrusion detection","author":"zhang","year":"2018","journal-title":"Proc NDIA Ground Vehicle Syst Eng Technol Symp (GVSETS)"},{"key":"ref56","article-title":"Embedded hybrid anomaly detection for automotive CAN communication","author":"weber","year":"2018","journal-title":"Proc Eur Congr Embedded Real-Time Softw Syst"},{"key":"ref55","article-title":"Detecting anomalies in controller area network for automobiles","author":"vasistha","year":"2017"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835978"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref40","first-page":"28","article-title":"Time complexity analysis of support vector machines (SVM) in LibSVM","volume":"128","author":"abdiansah","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref13","author":"van der heijden","year":"2016","journal-title":"Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2521642"},{"key":"ref81","year":"2018","journal-title":"Kdd cup data"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0062-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.313"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7733050"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref3","first-page":"77","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref6","author":"levi","year":"2017","journal-title":"Advanced analytics for connected cars cyber security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/computers5030016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500295"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2960407"},{"key":"ref46","author":"ganesan","year":"2017","journal-title":"Exploiting consistency among heterogeneous sensors for vehicle anomaly detection"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.02.023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053416"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref41","author":"narayanan","year":"2015","journal-title":"Using data analytics to detect anomalous states in vehicles"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08642311.pdf?arnumber=8642311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T10:17:11Z","timestamp":1643278631000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8642311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2894183","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}