{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:35:28Z","timestamp":1753922128451,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/iscas.2017.8050833","type":"proceedings-article","created":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T20:33:32Z","timestamp":1506630812000},"page":"1-4","source":"Crossref","is-referenced-by-count":8,"title":["A low-cost masquerade and replay attack detection method for CAN in automobiles"],"prefix":"10.1109","author":[{"given":"Mohammad Raashid","family":"Ansari","sequence":"first","affiliation":[]},{"given":"W. Thomas","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Chenghua","family":"She","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"ref12","article-title":"CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"2011","journal-title":"Proc Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"ref13","first-page":"1","article-title":"A newuw hardware implementation of the advanced encryption standard algorithm for automotive applications","author":"cassettari","year":"2014","journal-title":"Proc IEEE Ph D Research in Microelectronics and Electronics (PRIME)"},{"journal-title":"CAN Protocol Tutorial","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2025298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2003.1234763"},{"article-title":"2014 Car Hackers Handbook-Open Garages","year":"2014","author":"smith","key":"ref4"},{"journal-title":"CANBus Triple The car hacking platform","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593095"},{"key":"ref8","first-page":"22","article-title":"Automotive Cyberse-curity for In-Vehicle Communication","volume":"6","author":"kyusuk","year":"2014","journal-title":"IQT Quarterly"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"journal-title":"Hersteller Initiative Software (HIS)","year":"0","key":"ref9"}],"event":{"name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2017,5,28]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2017,5,31]]}},"container-title":["2017 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8014728\/8049747\/08050833.pdf?arnumber=8050833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:52:09Z","timestamp":1509141129000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8050833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscas.2017.8050833","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}