{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:38:22Z","timestamp":1773301102334,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T00:00:00Z","timestamp":1675555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T00:00:00Z","timestamp":1675555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,5]]},"DOI":"10.1109\/iceic57457.2023.10049883","type":"proceedings-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T18:20:59Z","timestamp":1678472459000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Design of Intrusion Detection System for Automotive CAN Bus Using Random Forest"],"prefix":"10.1109","author":[{"given":"Daegi","family":"Lee","sequence":"first","affiliation":[{"name":"Soongsil University,Republic of Korea"}]},{"given":"Changseon","family":"Han","sequence":"additional","affiliation":[{"name":"Soongsil University,Seoul,Korea"}]},{"given":"Seongsoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Soongsil University,Seoul,Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Upstream\u2019s 2022 Global Automotive Cybersecurity Report","year":"2022"},{"issue":"1","key":"ref2","first-page":"20","article-title":"A Study on the Standard Development Trend for Automotive Security Threats","volume":"29","author":"Kim","year":"2019","journal-title":"Review of KIISC"},{"key":"ref3","article-title":"Random Forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine Learning"},{"key":"ref4","article-title":"Error Detection and Correction Techniques for CAN Bus and SoC implementation","volume-title":"Master Thesis","author":"Kang","year":"2019"},{"issue":"4","key":"ref5","first-page":"1469","article-title":"Counterattack Method against Hacked Node in CAN Bus Physical Layer","volume":"23","author":"Kang","year":"2019","journal-title":"j.inst.Korean.electr.electron.eng."},{"issue":"1","key":"ref6","first-page":"665","article-title":"Physical Layer Security Method with CAN Bus Node ID Auto-Setting","volume":"24","author":"Kang","year":"2020","journal-title":"j.inst.Korean.electr.electron.eng."},{"key":"ref7","article-title":"Self-Studying Machine Learning + Deep learning","author":"Park","year":"2020"},{"key":"ref8","article-title":"Waikato Environment for Knowledge Analysis (WEKA)"},{"key":"ref9","article-title":"Adventures in Automotive Networks and Control Units","author":"Miller"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref12","first-page":"671","article-title":"CAN Bus Monitoring for Improving Vehicle Safety","volume-title":"Proceedings of KSAE Annual Spring","author":"Kim"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060416"}],"event":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","location":"Singapore","start":{"date-parts":[[2023,2,5]]},"end":{"date-parts":[[2023,2,8]]}},"container-title":["2023 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10049840\/10049805\/10049883.pdf?arnumber=10049883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:15:37Z","timestamp":1707848137000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iceic57457.2023.10049883","relation":{},"subject":[],"published":{"date-parts":[[2023,2,5]]}}}