{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:05:42Z","timestamp":1753520742328,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,19]]},"DOI":"10.1109\/icnc59896.2024.10556376","type":"proceedings-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T17:20:54Z","timestamp":1718990454000},"page":"387-393","source":"Crossref","is-referenced-by-count":1,"title":["Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems"],"prefix":"10.1109","author":[{"given":"Priva Chassem","family":"Kamdem","sequence":"first","affiliation":[{"name":"University of Dschang,Department of Mathematics &#x0026; Computer Science,Dschang,Cameroon"}]},{"given":"Alain","family":"Zemkoho","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, University of Southampton,Southampton,UK,SO17 1BJ"}]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory,Information Assurance Branch,Rome,NY,USA"}]},{"given":"Marcelin","family":"Nkenlifack","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory,Information Assurance Branch,Rome,NY,USA"}]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[{"name":"DEVCOM Army Research Laboratory,Network Security Branch,delphi,MD,USA"}]}],"member":"263","reference":[{"issue":"S 91","key":"ref1","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037705"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102288"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870866"},{"key":"ref6","first-page":"94","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"Miller","year":"2014","journal-title":"black hat USA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/25.69979"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103704"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2172\/911553"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2015.7152200"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3314063"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3102874"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MetroCAD48866.2020.00018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.260"},{"journal-title":"Investigating the use of honeypots in vehicles","year":"2022","author":"Eriksson","key":"ref16"}],"event":{"name":"2024 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2024,2,19]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2024,2,22]]}},"container-title":["2024 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10555566\/10555889\/10556376.pdf?arnumber=10556376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:42:58Z","timestamp":1727502178000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icnc59896.2024.10556376","relation":{},"subject":[],"published":{"date-parts":[[2024,2,19]]}}}