{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:47Z","timestamp":1762004987221,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/hst.2018.8383901","type":"proceedings-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T19:36:11Z","timestamp":1529004971000},"page":"134-137","source":"Crossref","is-referenced-by-count":2,"title":["Abnormal vehicle behavior induced using only fabricated informative CAN messages"],"prefix":"10.1109","author":[{"given":"Junko","family":"Takahashi","sequence":"first","affiliation":[]},{"given":"Masashi","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Fuji","sequence":"additional","affiliation":[]},{"given":"Toshio","family":"Narita","sequence":"additional","affiliation":[]},{"given":"Shunsuke","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Sato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"CAN Message Injection","author":"miller","year":"2016","journal-title":"OG Dynamite Edition"},{"key":"ref3","article-title":"Adventures in Automotive Networks and Control Units","author":"valasek","year":"2013","journal-title":"DEF CON 21 Hacking Conference"},{"journal-title":"Vector Informatik CANoe V9 5","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"journal-title":"Vector Informatik VN1630 Interface Family","year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"ref12","article-title":"Automotive Gateways-Bridge & Gateway from FlexRay\/CAN\/LIN to AVB Networks-","author":"bosch","year":"0","journal-title":"Avnu Automotive Advisory Council (AAA2C) Materials"},{"journal-title":"Technical White Paper","article-title":"Advanced Driver Assistant System Threats, Requirements, Security Solutions","year":"2015","key":"ref8"},{"key":"ref7","article-title":"A Novel Distributed Intrusion Detection System for Vehicular Ad Hoc Networks","volume":"6","author":"maglaras","year":"2015","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"ref2","article-title":"Compre-hensive Experimental Analyses of Automotive Attacks Surfaces","author":"checkoway","year":"2011","journal-title":"20th USENIX Security Symposium"},{"key":"ref9","article-title":"A Survey of Remote Automotive Attack Surfaces","volume":"22","author":"miller","year":"2014","journal-title":"Defcon Hacking Conference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"}],"event":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2018,4,30]]},"location":"Washington, DC","end":{"date-parts":[[2018,5,4]]}},"container-title":["2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369415\/8383882\/08383901.pdf?arnumber=8383901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T21:31:31Z","timestamp":1530567091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/hst.2018.8383901","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}