{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:43:12Z","timestamp":1755801792956,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/ipccc47392.2019.8958766","type":"proceedings-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T21:04:32Z","timestamp":1579208672000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Miaoqing","family":"Tian","sequence":"first","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]},{"given":"Ruobing","family":"Jiang","sequence":"additional","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]},{"given":"Chaoqun","family":"Xing","sequence":"additional","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]},{"given":"Qian","family":"Lu","sequence":"additional","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]},{"given":"Xiaoyun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Ocean University of China,Department of Computer Science and Technology,Qingdao,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"ref12","article-title":"On the fingerprinting of electronic control units using physical characteristics in controller area networks","author":"kneib","year":"2017","journal-title":"INFOR-MATIK 2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2690423"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2307852"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"journal-title":"CAN-BUS Shield V2","year":"0","key":"ref27"},{"key":"ref3","first-page":"21","article-title":"Hackers remotely kill a jeep on the highwaywith me in it","volume":"7","author":"greenberg","year":"2015","journal-title":"Wired"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref8","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"In USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref2","article-title":"Free-fall: Hacking tesla from wireless to can bus","author":"nie","year":"2017","journal-title":"Black Hat Briefings"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref1","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"journal-title":"CAN Specification Version 2 0","year":"1991","author":"gmbh","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4271\/2012-01-0999"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4271\/2012-01-0606"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2295808"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277865"},{"journal-title":"ARDUINO UNO REV3","year":"0","key":"ref26"},{"key":"ref25","first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"In USENIX Security Symposium"}],"event":{"name":"2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2019,10,29]]},"location":"London, UK","end":{"date-parts":[[2019,10,31]]}},"container-title":["2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8955479\/8958711\/08958766.pdf?arnumber=8958766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:34:57Z","timestamp":1755714897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8958766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ipccc47392.2019.8958766","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}