{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:59:12Z","timestamp":1773773952361,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/icves.2019.8906465","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T19:54:20Z","timestamp":1574711660000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["A survey of network intrusion detection systems for controller area network"],"prefix":"10.1109","author":[{"given":"Guillaume","family":"Dupont","sequence":"first","affiliation":[]},{"given":"Jerry","family":"den Hartog","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]},{"given":"Alexios","family":"Lekidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2869351"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref33","article-title":"Adventures in Automotive Networks and Control Units","author":"miller","year":"0"},{"key":"ref32","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","volume":"39","author":"rouf","year":"2010","journal-title":"Proc of the USENIX Security Symposium"},{"key":"ref31","article-title":"CAN tutorial","year":"0","journal-title":"Contemporary Controls Tech Rep"},{"key":"ref30","year":"1991","journal-title":"CAN Specification Version 2 0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2666605"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"ref11","first-page":"911","article-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection","author":"cho","year":"2016","journal-title":"25th USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref16","article-title":"A survey of remote automotive attack surfaces","author":"miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4271\/2016-01-0068"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref28","article-title":"CAN Protocol - Understanding the Controller Area Network Protocol","year":"0"},{"key":"ref4","first-page":"1","article-title":"Free-Fall : Hacking Tesla From Wireless To Can Bus","author":"nie","year":"2017","journal-title":"BlackHat USA 2017"},{"key":"ref27","article-title":"Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network","author":"tomlinson","year":"2018","journal-title":"2nd Computer Science in Cars Symposium - Future Challenges in Artificial Intelligence Security for Autonomous Vehicles (CSCS 2018)"},{"key":"ref3","article-title":"CAN Message Injection - OG Dynamite Edition","author":"valasek","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref29","article-title":"CAN Overview","year":"0"},{"key":"ref5","article-title":"Intrusion prevention system of automotive network CAN bus","author":"abbott-mccune","year":"2017","journal-title":"ICC 2017"},{"key":"ref8","first-page":"45","article-title":"Frequency-based anomaly detection for the automotive can bus","author":"japkowicz","year":"2015","journal-title":"IEEE World Congress on Industrial Control Systems Security (WCICSS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"ref2","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4271\/2014-01-0340"},{"key":"ref1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref46","first-page":"1","article-title":"Experiences with specification-based intrusion detection","author":"uppuluri","year":"2000","journal-title":"RAID 2000"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2018.089430"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74176-5_25"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref42","article-title":"OBD SecureAlert : An Anomaly Detection System for Vehicles","author":"narayanan","year":"2016","journal-title":"SMARTCOMP 2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2991\/citcs.2012.161"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2018.8618564"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2899062"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865169"},{"key":"ref25","first-page":"132","article-title":"Anomaly Detection for In-Vehicle Networks using a Sensor-based Approach","volume":"6","author":"m\u00fcter","year":"2011","journal-title":"Journal of Information Assurance and Security"}],"event":{"name":"2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","location":"Cairo, Egypt","start":{"date-parts":[[2019,9,4]]},"end":{"date-parts":[[2019,9,6]]}},"container-title":["2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8901047\/8906290\/08906465.pdf?arnumber=8906465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:31Z","timestamp":1658094871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8906465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icves.2019.8906465","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}