{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:26:55Z","timestamp":1766068015158,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T00:00:00Z","timestamp":1717286400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T00:00:00Z","timestamp":1717286400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,2]]},"DOI":"10.1109\/iv55156.2024.10588659","type":"proceedings-article","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T17:19:28Z","timestamp":1721063968000},"page":"1779-1785","source":"Crossref","is-referenced-by-count":2,"title":["Advanced IDPS Architecture for Connected and Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Sherin Kalli","family":"Valappil","sequence":"first","affiliation":[{"name":"Robert Bosch GmbH,Abstatt,Germany"}]},{"given":"Lars","family":"Vogel","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH,Abstatt,Germany"}]},{"given":"Mohammad","family":"Hamad","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68028-2_15"},{"year":"2020","key":"ref2","article-title":"UN Regulation No. 155: Cybersecurity and Cybersecurity Management Systems for Vehicles"},{"journal-title":"Specification of Intrusion Detection System Manager","year":"2020","key":"ref3"},{"year":"2020","key":"ref4","article-title":"AUTOSAR SWS:Specification of Intrusion Detection System Manager"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0007715201480158"},{"article-title":"Cybersecurity evaluation of automotive e\/e architectures","volume-title":"ACM Computer Science In Cars Symposium (CSCS 2018)","author":"Ring","key":"ref6"},{"issue":"260-264","key":"ref7","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller","year":"2013","journal-title":"Def Con"},{"key":"ref8","first-page":"1","article-title":"Free-Fall: Hacking Tesla from Wireless to CAN Bus","author":"Nie","year":"2018","journal-title":"Black Hat Europe"},{"article-title":"Wanna drive? feasible attack paths and effective protection against ransomware in modern vehicles","year":"2017","author":"Wolf","key":"ref9"},{"article-title":"Cyber Kill Chain : Intelligence Driven Defense","volume-title":"tech. rep., Lockheed Martin Corporation","year":"2014","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud49737.2020.00035"},{"author":"Mackay","key":"ref12","article-title":"When 21434 and R155 ATTACK"},{"key":"ref13","article-title":"D3FEND"},{"article-title":"Experimental Security Assessment of BMW Cars: A Summary Report","volume-title":"tech. rep.","year":"2018","key":"ref14"},{"article-title":"Experimental security assessment of mercedes-benz cars","volume-title":"tech. rep.","year":"2021","key":"ref15"},{"key":"ref16","first-page":"155","article-title":"A policy-based communications architecture for vehicles","volume-title":"2015 International Conference on Information Systems Security and Privacy (ICISSP)","author":"Prevelakis"},{"journal-title":"AUTOSAR Adaptive Platform Specification: R20-11, AUTOSAR Development Partnership","article-title":"AUTOSAR SWS: Specification of Execution Management","year":"2020","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-94"},{"year":"2022","key":"ref19","article-title":"Continuous Security Monitoring with ESCRYPT Intrusion Detection Solutions"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275646"},{"journal-title":"Standard ISO 14229-1:2020, International Organization for Standardization, Geneva, CH","article-title":"Road vehicles \u2014 Unified diagnostic services (UDS) \u2014 Part 1: Specification and requirements","year":"2020","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN60443.2023.10453176"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3389\/ffutr.2021.792573"},{"year":"2016","key":"ref25","article-title":"Microsoft Threat Modeling Tool 2016"},{"key":"ref26","article-title":"Applying intrusion detection to automotive it-early insights and remaining challenges","author":"Hoppe","year":"2009","journal-title":"Journal of Information Assurance and Security (JIAS)"},{"issue":"9","key":"ref27","first-page":"3669","article-title":"Practical vulnerability-information-sharing architecture for automotive SRA","volume":"21","author":"Lee","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref28","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume-title":"LISA","author":"Roesch"},{"key":"ref29","first-page":"21","article-title":"Context-aware intrusion detection in automotive control systems","volume-title":"Proc. 5th ESCAR USA Conf","author":"Wasicek"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref32","article-title":"Security software for Automotive System-on-Chip ESCRYPT CycurSoC"}],"event":{"name":"2024 IEEE Intelligent Vehicle Symposium (IV)","start":{"date-parts":[[2024,6,2]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2024,6,5]]}},"container-title":["2024 IEEE Intelligent Vehicles Symposium (IV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10587320\/10588370\/10588659.pdf?arnumber=10588659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T04:59:53Z","timestamp":1721365193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10588659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iv55156.2024.10588659","relation":{},"subject":[],"published":{"date-parts":[[2024,6,2]]}}}