{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:31:00Z","timestamp":1729647060610,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/dft.2015.7315168","type":"proceedings-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T22:49:30Z","timestamp":1447109370000},"page":"233-236","source":"Crossref","is-referenced-by-count":9,"title":["IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles"],"prefix":"10.1109","author":[{"given":"Mohammad Raashid","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Shucheng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"2014 Car Hackers Handbook - Open Garages","year":"0","author":"smith","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","article-title":"Security threats to automotive can networks-practical examples and selected short-term countermeasures","author":"hoppe","year":"2008","journal-title":"Proc 27th international conference on Computer Safety Reliability and Security SAFECOMP"},{"key":"ref6","first-page":"22","article-title":"Automotive Cybersecurity for In-Vehicle Communication","volume":"6","author":"han","year":"2014","journal-title":"IQT Quarterly"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2991\/citcs.2012.161"},{"key":"ref7","article-title":"The HCS12\/9S12: An Introduction to Software and Hardware Interfacing","author":"han-way","year":"0","journal-title":"Thomson Delmar Learning Chapter 13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref1","first-page":"1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security"}],"event":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","start":{"date-parts":[[2015,10,12]]},"location":"Amherst, MA, USA","end":{"date-parts":[[2015,10,14]]}},"container-title":["2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7304347\/7315124\/07315168.pdf?arnumber=7315168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T23:14:38Z","timestamp":1498259678000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7315168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/dft.2015.7315168","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}