{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:31Z","timestamp":1759335631854,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/itsc48978.2021.9564896","type":"proceedings-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T15:52:26Z","timestamp":1635177146000},"page":"1286-1291","source":"Crossref","is-referenced-by-count":2,"title":["In-Vehicle Network Attack Detection Across Vehicle Models: A Supervised-Unsupervised Hybrid Approach"],"prefix":"10.1109","author":[{"given":"Shu","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Koh","family":"Takeuchi","sequence":"additional","affiliation":[]},{"given":"Hisashi","family":"Kashima","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Kishikawa","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Ushio","sequence":"additional","affiliation":[]},{"given":"Tomoyuki","family":"Haga","sequence":"additional","affiliation":[]},{"given":"Takamitsu","family":"Sasaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/VTCSpring.2016.7504089"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/DSAA.2016.20"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ITSC.2019.8917300"},{"key":"ref13","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"0","journal-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security)"},{"key":"ref14","article-title":"Intrusion detection by density estimation of reception cycle periods for in-vehicle networks: A proposal","author":"hamada","year":"0","journal-title":"Proceedings of the 14th International Conference on Embedded Security in Cars (ESCAR)"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WCICSS.2015.7420322"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.2197\/ipsjjip.26.306"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.vehcom.2018.09.004","article-title":"Anomaly intrusion detection method for vehicular networks based on survival analysis","volume":"14","author":"han","year":"2018","journal-title":"Vehicular Communications"},{"key":"ref19","first-page":"3146","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume":"30","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref4","first-page":"57","article-title":"Practical modbus flooding attack and detection","author":"bhatia","year":"0","journal-title":"Proceedings of the 12th Australasian Information Security Conference (AISC)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/CISS.2011.5766111"},{"key":"ref6","first-page":"452","article-title":"DDoS attack detection algorithms based on entropy computing","author":"li","year":"0","journal-title":"Proceedings of the 9th International Conference on Information and Communications Security (ICICS)"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.comcom.2012.04.002"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IVS.2011.5940552"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref2","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SP.2010.34"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/RTSI.2016.7740627"}],"event":{"name":"2021 IEEE International Intelligent Transportation Systems Conference (ITSC)","start":{"date-parts":[[2021,9,19]]},"location":"Indianapolis, IN, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Intelligent Transportation Systems Conference (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9564393\/9564395\/09564896.pdf?arnumber=9564896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:47:29Z","timestamp":1652183249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9564896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itsc48978.2021.9564896","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}