{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:29Z","timestamp":1756273229979,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130158","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"570-577","source":"Crossref","is-referenced-by-count":0,"title":["CAN-MAID: An Intrusion Detection Protocol for CAN Bus"],"prefix":"10.1109","author":[{"given":"L.W.","family":"Kevin Marquis","sequence":"first","affiliation":[{"name":"University of Connecticut,Department of Electrical and Computer Engineering,Storrs,CT,USA"}]},{"given":"John","family":"Chandy","sequence":"additional","affiliation":[{"name":"University of Connecticut,Department of Electrical and Computer Engineering,Storrs,CT,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s20082364"},{"year":"2025","key":"ref2","article-title":"Automotive ECU-Journey from Mechanical to Electronics Based Control Units"},{"volume-title":"Allied Market Research","year":"2025","key":"ref3"},{"volume-title":"Adventures in Automotive Networks and Control Units","year":"2013","author":"Valasek","key":"ref4"},{"volume-title":"Adventures in Automotive Networks and Control Units, IOActive","year":"2014","author":"Vaklasek","key":"ref5"},{"article-title":"Remote Exploitation of an Unaltered Passenger Vehicle","year":"2023","author":"Valasek","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc.2019.8651708"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iccecome.2018.8658720"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/vnc.2016.7835977"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/mwscas.2017.8053160"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iot.2014.7030108"},{"article-title":"CAN Bus Security: Attacks on CAN bus and their mitigations, Canis Automotive Labs","year":"2020","author":"Tindell","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485883"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2009.5270342"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cybersecurity.2012.7"},{"key":"ref18","first-page":"911927","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium, in SEC16. USA: USENIX Association","author":"Cho"},{"article-title":"Introduction to the Controller Area Network (CAN)","year":"2016","author":"Corrigan","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/sahcn.2019.8824887"},{"article-title":"The Transport Layer Security (TLS) Protocol Version 1.3, Mozilla, Internet Engineering Task Force","year":"2018","author":"Rescorla","key":"ref22"},{"volume-title":"Basics of SRAM PUF and How to Deploy It for IoT Security, Embedded.com","year":"2021","author":"Dahad","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ises54909.2022.00142"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/apccas.2018.8605707"},{"journal-title":"CAST","article-title":"Security for the Third Generation of the CAN Bus","year":"2025","key":"ref26"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130158.pdf?arnumber=11130158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:07:48Z","timestamp":1756271268000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130158","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}