{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:08:32Z","timestamp":1725728912257},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,23]]},"DOI":"10.1109\/icsrs56243.2022.10067294","type":"proceedings-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T19:48:19Z","timestamp":1679428099000},"page":"412-417","source":"Crossref","is-referenced-by-count":1,"title":["Enforcement Cybersecurity Techniques: A Lightweight Encryption over the CAN-Bus"],"prefix":"10.1109","author":[{"given":"Marco","family":"Carrat\u00f9","sequence":"first","affiliation":[{"name":"University of Salerno,Department of Industrial Engineering,Fisciano,SA,Italy,84025"}]},{"given":"Francesco","family":"Pascale","sequence":"additional","affiliation":[{"name":"Accenture SPA Industry X,Roma,Italy,00144"}]},{"given":"Antonio","family":"Pietrosanto","sequence":"additional","affiliation":[{"name":"University of Salerno,Department of Industrial Engineering,Fisciano,SA,Italy,84025"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2017.0205"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053430"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icm.2018.8704022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icoiact50329.2020.9331966"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/iceest.2018.8643317"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iccc47050.2019.9064352"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icpds47662.2019.9017202"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icmsao.2017.7934878"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2960407"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1640167"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s20082364"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iccecome.2018.8658720"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/rteict.2016.7807831"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3181160"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815711"},{"article-title":"Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network","year":"2016","author":"Kim","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2603850"},{"journal-title":"CAN Obfuscation by Randomization (CANORa)","year":"2018","author":"Hof","key":"ref18"},{"journal-title":"Security-Aware Obfuscated Priority Assignment for Automotive CAN Platforms","year":"2016","author":"Steinhorst","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2015.7296537"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053160"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1115\/1.4052823"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10151765"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4271\/1593277032"},{"article-title":"The Automotive Grade Linux Software Defined Connected Car Architecture","volume-title":"white paper, The Linux Foundation Automotive Grade Linux (AGL) Virtualization Expert Group (EG-VIRT), The AGL Software Defined Connected Car Architecture","author":"Paolino","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icenco48310.2019.9027298"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icoac.2011.6165187"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icsrs48664.2019.8987605"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/info12020087"}],"event":{"name":"2022 6th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2022,11,23]]},"location":"Venice, Italy","end":{"date-parts":[[2022,11,25]]}},"container-title":["2022 6th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10067250\/10067256\/10067294.pdf?arnumber=10067294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T04:42:32Z","timestamp":1709440952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icsrs56243.2022.10067294","relation":{},"subject":[],"published":{"date-parts":[[2022,11,23]]}}}