{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T05:08:40Z","timestamp":1746508120848,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8390816","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:28:02Z","timestamp":1529954882000},"page":"841-846","source":"Crossref","is-referenced-by-count":6,"title":["Visual analysis of CAN bus traffic injection using radial bar charts"],"prefix":"10.1109","author":[{"given":"Maxim","family":"Kolomeets","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.15622\/sp.46.8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.15622\/sp.42.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739584"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2017.8062198"},{"key":"ref14","first-page":"68","article-title":"Multi-dimensional visualization for network forensic analysis","author":"promrit","year":"2011","journal-title":"Networked Computing (INC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495932"},{"journal-title":"Hacking and Countermeasure Research Lab","year":"0","key":"ref16"},{"journal-title":"canbus","year":"2018","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860915-0\/50046-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.75"},{"journal-title":"Argus Intrusion Detection and Prevention System","year":"0","key":"ref4"},{"journal-title":"Towersec ECUSHIELD","year":"0","key":"ref3"},{"journal-title":"A Security Evaluation and Internal Penetration Testing Of the CAN-bus","year":"2014","author":"talebi","key":"ref6"},{"key":"ref5","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","author":"petit","year":"2015","journal-title":"Black Hat Europe'06"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-319-65127-9_7","article-title":"Choosing models for security metrics visualization","volume":"10446","author":"kolomeec","year":"0","journal-title":"Computer Network Security Lecture Notes in Computer Science"},{"key":"ref7","article-title":"Detecting Attacks on the CAN Protocol With Machine Learning","author":"chockalingam","year":"2016","journal-title":"8th Annual EECS 588 Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref9","first-page":"41","article-title":"Technique of Data Visualization: Example of Network Topology Display for Security Monitoring","volume":"7","author":"kolomeec","year":"2016","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08390816.pdf?arnumber=8390816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:29:33Z","timestamp":1643210973000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8390816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8390816","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}