{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:15:14Z","timestamp":1762866914675},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icc.2016.7511098","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T16:28:51Z","timestamp":1469550531000},"source":"Crossref","is-referenced-by-count":24,"title":["A simple intrusion detection method for controller area network"],"prefix":"10.1109","author":[{"given":"Aymen","family":"Boudguiga","sequence":"first","affiliation":[]},{"given":"Witold","family":"Klaudel","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Boulanger","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Chiron","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2239301"},{"key":"ref13","first-page":"35","article-title":"Efficient and Secure Source Authentication for Multicast","author":"perrig","year":"2001","journal-title":"Network and Distributed System Security Symposium Feb 2001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.45"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266516"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref3","article-title":"Simulated Attacks on CAN Buses: Vehicle Virus","author":"nilsson","year":"0","journal-title":"Proceedings of the Fifth International Conference on Communication Systems and Networks (AsiaCSN 2008)"},{"key":"ref6","article-title":"Jeep hacking 101","author":"schneider","year":"0"},{"key":"ref5","article-title":"Com-prehensive Experimental Analyses of Automotive Attack Surfaces","author":"checkoway","year":"0","journal-title":"Proceedings of the 20th USENIX Conference on Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270342"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.369"},{"key":"ref2","article-title":"Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures","author":"hoppe","year":"0","journal-title":"Proceedings of the 27th International Conference on Computer Safety Reliability and Security (SAFECOMP 2008)"},{"key":"ref1","year":"1991","journal-title":"CAN Specification Version 2 0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"ref20","author":"lily","year":"2009","journal-title":"Special Publication 800-108 Recommendation for Key Derivation Using Pseudorandom Functions"},{"key":"ref22","year":"2012","journal-title":"CAN FD Specification Version 1 0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-107r1"}],"event":{"name":"ICC 2016 - 2016 IEEE International Conference on Communications","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2016,5,22]]},"end":{"date-parts":[[2016,5,27]]}},"container-title":["2016 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502491\/7510595\/07511098.pdf?arnumber=7511098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:22:07Z","timestamp":1475176927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7511098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2016.7511098","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}