{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:08:20Z","timestamp":1768522100533,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041387","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"373-377","source":"Crossref","is-referenced-by-count":2,"title":["Autonomous Vehicle Cyber-Attacks Classification Framework"],"prefix":"10.1109","author":[{"given":"Yazan","family":"Aref","sequence":"first","affiliation":[{"name":"Western University,Electrical and Computer Engineering Department,London,Canada"}]},{"given":"Abdelkader","family":"Ouda","sequence":"additional","affiliation":[{"name":"Western University,Electrical and Computer Engineering Department,London,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2020.3037705","article-title":"Attacks on Self-Driving Cars and Their Countermeasures: A Survey","volume":"8","author":"Chowdhury","year":"2020","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-60876-1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017","volume":"10327","author":"Polychronakis","year":"2017"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2010.34","article-title":"Experimental Security Analysis of a Modern Automobile","volume-title":"2010 IEEE Symposium on Security and Privacy","author":"Koscher"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2014.2342271","article-title":"Potential Cyberattacks on Automated Vehicles","author":"Petit","year":"2014","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref5","author":"Petit","journal-title":"Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR"},{"issue":"6","key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.2015.7120028","article-title":"Security vulnerabilities of connected vehicle streams and their impact on cooperative driving","volume":"53","author":"Amoozadeh","year":"2015","journal-title":"IEEE Communications Magazine"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.trpro.2020.02.049","article-title":"How Do Autonomous Cars Work?","volume":"44","author":"Ondru\u0161","year":"2020","journal-title":"Transportation Research Procedia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/224\/1\/012029"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3492778","article-title":"Building Vehicle Autonomy: Sensors, Semiconductors, Software and U.S. Competitiveness","author":"Coffin","year":"2019","journal-title":"SSRN Electronic Journal"},{"issue":"11","key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref11","doi-asserted-by":"crossref","volume-title":"Humans vs. machines: Ai and machine learning in cybersecurity. [Online]","author":"Chiu","DOI":"10.1145\/2502081.2502123"},{"key":"ref12","volume-title":"Ransomware: The cyber attacks on the automotive industry"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3372938.3372940"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-021-00236-4"},{"key":"ref15","author":"Calem","journal-title":"Cars integrate with smart homes"},{"key":"ref16","author":"Rouf","journal-title":"Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/SAHCNW.2009.5172962","article-title":"Security and Privacy Issues for Inter-vehicle Communications in VANETs","volume-title":"2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops","author":"Chim"},{"key":"ref18","author":"Wolf","journal-title":"Feasible Attack Paths and Effective Protection Against Ransomware in Modern Vehicles"},{"key":"ref19","volume-title":"Bluetooth attacks and how to secure your"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102269","article-title":"A survey on security attacks and defense techniques for connected and autonomous vehicles","volume":"109","author":"Pham","year":"2021","journal-title":"Computers & Security"},{"key":"ref21","author":"Hansman","journal-title":"A Taxonomy of Network and Computer Attack Methodologies"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1109\/ISTAFRICA.2016.7530663","article-title":"Classification of cyber attacks in South Africa","volume-title":"2016 IST-Africa Week Conference","author":"Van Heerden"},{"key":"ref23","author":"Hartzell","journal-title":"Automobile CAN Bus Network Security and Vulnerabilities"},{"key":"ref24","author":"Uma","year":"2013","journal-title":"A Survey on Various Cyber Attacks and Their Classification"},{"key":"ref25","author":"Lambert","year":"2022","journal-title":"Hacked electric car charging stations in russia display \u2018putin is a d*ckhead\u2019 and \u2018glory to ukraine\u2019"},{"key":"ref26","volume-title":"Impact of network attacks on operations of an organization","year":"2022"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2023,1,3]]},"end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041387.pdf?arnumber=10041387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:40:22Z","timestamp":1707835222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041387","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}