{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:43:18Z","timestamp":1768009398629,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1109\/iscc61673.2024.10733705","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:32:28Z","timestamp":1730395948000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation"],"prefix":"10.1109","author":[{"given":"Sadek Misto","family":"Kirdi","sequence":"first","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]},{"given":"Nicola","family":"Scarano","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]},{"given":"Franco","family":"Oberti","sequence":"additional","affiliation":[{"name":"Dumarey Softronix S.r.l,Torino"}]},{"given":"Luca","family":"Mannella","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]},{"given":"Stefano","family":"Di Carlo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]},{"given":"Alessandro","family":"Savino","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8053-6"},{"key":"ref2","article-title":"Global automotive cybersecurity report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4271\/921603"},{"key":"ref4","first-page":"720","article-title":"State-of-the-art survey on in-vehicle network communication \u010ban-buss\u0308ecurity and vulnerabilities","volume":"6","author":"Avatefipour","year":"2017","journal-title":"International Journal of Computer Science and Network"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS52814.2021.9486688"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3402986"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app13031942"},{"key":"ref8","article-title":"Peace of mind car hacking relay attack","author":"Forum","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s24020590"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3388716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0296879"},{"key":"ref18","article-title":"Simscape","year":"2024"},{"key":"ref19","article-title":"Simulation and model-based design","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-023-02716-9"},{"key":"ref22","article-title":"Automotive controller area network (can) bus intrusion dataset v2","author":"Dupont","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"ref24","article-title":"CAN Hacker: Tools and Resources for CAN Bus Hacking","author":"Hacker","year":"2023"},{"key":"ref25","article-title":"Candb++ editor","year":"2024"}],"event":{"name":"2024 IEEE Symposium on Computers and Communications (ISCC)","location":"Paris, France","start":{"date-parts":[[2024,6,26]]},"end":{"date-parts":[[2024,6,29]]}},"container-title":["2024 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10733347\/10733557\/10733705.pdf?arnumber=10733705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:38:16Z","timestamp":1732689496000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10733705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc61673.2024.10733705","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]}}}