{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:27:46Z","timestamp":1730266066025,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9206825","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Identify Potential Attacks from Simulated Log Analysis"],"prefix":"10.1109","author":[{"given":"Cinzia","family":"Bernardeschi","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Domenici","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref12","first-page":"393","article-title":"Security issues and challenges of vehicular ad hoc networks (vanet)","author":"samara","year":"2010","journal-title":"New Trends in Information Science and Service Science (NISS) 2010 4th International Conference on"},{"year":"2016","key":"ref13","article-title":"Simulink web site"},{"key":"ref14","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158098"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5302104"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.102213.132056"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450813-3\/50026-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3274-y"},{"key":"ref27","first-page":"394","article-title":"The NCSU concurrency workbench","volume":"1996","author":"cleaveland","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.12.050"},{"key":"ref29","article-title":"Formal methods for prostate cancer gleason score and treatment prediction using radiomic biomarkers","author":"brunese","year":"2019","journal-title":"Magnetic Resonance Imaging"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"ref8","article-title":"Who&#x2019;s driving my car? a machine learning based approach to driver identification","author":"martinelli","year":"2018","journal-title":"ICISS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99229-7_32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2634938"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906929"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5220\/0006755205620569"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0007705307000708"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2694423"},{"key":"ref23","first-page":"423","article-title":"Co-simulation of semi-autonomous systems: The line follower robot case study","volume":"2017","author":"palmieri","year":"2017","journal-title":"Software Engineering and Formal Methods - SEFM 2017 Collocated Workshops DataMod FAACS MSE CoSim-CPS and FOCLASA"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","article-title":"Results on the propositional mu-calculus","volume":"27","author":"kozen","year":"1983","journal-title":"Theor Comput Sci"},{"journal-title":"Communication and Concurrency","year":"1989","author":"milner","key":"ref25"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09206825.pdf?arnumber=9206825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:07Z","timestamp":1656453247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9206825","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}