{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:57:47Z","timestamp":1764403067285,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,24]]},"DOI":"10.1109\/ciss50987.2021.9400233","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:11:36Z","timestamp":1619061096000},"page":"1-4","source":"Crossref","is-referenced-by-count":13,"title":["An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Nandi","family":"Leslie","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"journal-title":"Algorithms for clustering data","year":"1988","author":"jain","key":"ref13"},{"key":"ref14","first-page":"463","article-title":"An impossibility theorem for clustering","author":"kleinberg","year":"2003","journal-title":"Advances in neural information processing systems"},{"key":"ref15","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref6","article-title":"Towards Reverse Engineering Controller Area Network Messages Using Machine Learning","author":"young","year":"2020","journal-title":"IEEE WF-IoT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"ref8","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"0","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref7","article-title":"Embedded hybrid anomaly detection for automotive CAN communication","author":"weber","year":"2018","journal-title":"9th European Congress on Embedded Real Time Software and Systems (ERTS 2018)"},{"key":"ref2","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"}],"event":{"name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2021,3,24]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2021,3,26]]}},"container-title":["2021 55th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9400188\/9400208\/09400233.pdf?arnumber=9400233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T23:56:00Z","timestamp":1643414160000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9400233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ciss50987.2021.9400233","relation":{},"subject":[],"published":{"date-parts":[[2021,3,24]]}}}