{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:59:54Z","timestamp":1753520394340},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1109\/educon46332.2021.9454086","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T20:36:14Z","timestamp":1624048574000},"page":"1379-1385","source":"Crossref","is-referenced-by-count":3,"title":["Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Sophia","family":"McCall","sequence":"first","affiliation":[]},{"given":"Cagatay","family":"Yucel","sequence":"additional","affiliation":[]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"The future of automative telematics","author":"juliussen","year":"2003","journal-title":"Business Briefing Global Automotive Manufacturing and Technology"},{"journal-title":"Vehicle telematics security getting it right","year":"2020","author":"partners","key":"ref11"},{"key":"ref12","article-title":"Secure OTA software updates in connected vehicles: a survey","author":"halder","year":"2019","journal-title":"ArXiv"},{"journal-title":"ABI research forecasts 8 million vehicles to ship with SAE Level 3 4 and 5 autonomous technology in 2025","year":"2018","key":"ref13"},{"journal-title":"Automotive","year":"2019","key":"ref14"},{"journal-title":"SAE J3016 Automated-Driving Graphic","year":"2019","author":"shuttleworth","key":"ref15"},{"key":"ref16","article-title":"Self-driving and connected Cars: fooling Sensors and tracking drivers","author":"petit","year":"2015","journal-title":"Tech Rep"},{"journal-title":"How automotive LIDAR works for autonomous vehicles","year":"2018","author":"saxena","key":"ref17"},{"key":"ref18","article-title":"Automotive security best bractices 1 automotive security best practices recommendations for security and privacy in the era of the next-generation car","author":"mcafee","year":"2017","journal-title":"Tech Rep"},{"key":"ref19","first-page":"113","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","author":"hutchins","year":"2011","journal-title":"6th International Conference on Information Warfare and Security ICIW 2011"},{"key":"ref4","article-title":"Challenges in automotive security","author":"oancea","year":"2019","journal-title":"Proceedings of the 10th International Conference on Electronics Computers and Artificial Intelligence ECAI 2018"},{"journal-title":"Three pillars of cyber security","year":"2017","author":"dutton","key":"ref3"},{"key":"ref6","article-title":"MobilBye: attacking ADAS with camera spoofing","author":"nassi","year":"2019","journal-title":"ArXiv"},{"journal-title":"Common Attacks Against Car Infotainment systems","year":"2019","author":"tong","key":"ref5"},{"journal-title":"Hackers can steal a Tesla Model S in seconds by cloning its key fob","year":"2018","author":"greenberg","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"journal-title":"Tech Rep","article-title":"Good practices for security of smart cars","year":"2019","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3072952"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.66-85"},{"journal-title":"The ATT&CK&#x2122; navigator a new open source project","year":"2018","author":"struse","key":"ref20"}],"event":{"name":"2021 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2021,4,21]]},"location":"Vienna, Austria","end":{"date-parts":[[2021,4,23]]}},"container-title":["2021 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9453798\/9453843\/09454086.pdf?arnumber=9454086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:38Z","timestamp":1652197358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9454086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/educon46332.2021.9454086","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]}}}