{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:08:50Z","timestamp":1729631330914,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ivs.2017.7995800","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T16:40:12Z","timestamp":1501519212000},"page":"705-711","source":"Crossref","is-referenced-by-count":3,"title":["Towards secure and safe appified automated vehicles"],"prefix":"10.1109","author":[{"given":"Yunhan Jack","family":"Jia","sequence":"first","affiliation":[]},{"given":"Ding","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Accelerated Evaluation of Automated Vehicles Safety in Lane-Change Scenarios Based on Importance Sampling Techniques","author":"zhao","year":"2016","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"journal-title":"MirrorLink","year":"0","key":"ref10"},{"journal-title":"The Openxc Platform","year":"0","key":"ref11"},{"journal-title":"PolySync","year":"0","key":"ref12"},{"journal-title":"Samsung SmartThings","year":"0","key":"ref13"},{"journal-title":"The Structure of Android Package Files","year":"0","key":"ref14"},{"journal-title":"U-M Open-access Self-driving Vehicle","year":"0","key":"ref15"},{"key":"ref16","first-page":"235","article-title":"Comparison of event-triggered and time-triggered concepts with regard to distributed control systems","author":"albert","year":"2004","journal-title":"Embedded World 2004"},{"key":"ref17","first-page":"18","article-title":"The use and limitations of static-analysis tools to improve software quality CrossTalk","volume":"21","author":"anderson","year":"2008","journal-title":"The Journal of Defense Software Engineering"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2666356.2594299","article-title":"Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps","volume":"49","author":"arzt","year":"2014","journal-title":"ACM SIGPLAN Notices"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813643"},{"journal-title":"A survey of static program analysis techniques Technical report Citeseer","year":"2005","author":"w\u00f6gerer","key":"ref28"},{"journal-title":"How Vetting Mobile Apps Works for App Stores and Its Users","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"journal-title":"DroneDeploy","year":"0","key":"ref3"},{"journal-title":"Inside the Self-Driving Tesla Fatal Accident","year":"0","key":"ref6"},{"key":"ref29","first-page":"12","author":"zhao","year":"2016","journal-title":"Accelerated Evaluation of Automated Vehicles in Car-Following Maneuvers"},{"journal-title":"The hp sdn app store","year":"0","key":"ref5"},{"journal-title":"Introduction to XML","year":"0","key":"ref8"},{"journal-title":"Intermediate Representation of Cross-language Interoperability","year":"0","key":"ref7"},{"journal-title":"Car hacking how big is the threat to self-driving cars?","year":"0","key":"ref2"},{"journal-title":"Mcity","year":"0","key":"ref9"},{"journal-title":"After Jeep Hack Chrysler Recalls 1 4M Vehicles for Bug Fix","year":"0","key":"ref1"},{"journal-title":"Q4 2012 Smartphone Market shares-IDC","year":"0","author":"cooperation","key":"ref20"},{"journal-title":"European Commission Brussels","article-title":"FESTA-Consortium et al Festa handbook version 2 deliverable t6. 4 of the field operational test support action","year":"2008","key":"ref22"},{"key":"ref21","first-page":"2","article-title":"A study of android application securit","volume":"2","author":"enck","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref24","article-title":"A security analysis of an in vehicle infotainment and app platform","author":"mazloom","year":"0","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16) USENIX Association"},{"journal-title":"Accelerated Evaluation of Automated Vehicles Using Piecewise Mixture Models","year":"0","author":"huang","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"journal-title":"U D of Transportation Federal automated vehicles policy","year":"2016","key":"ref25"}],"event":{"name":"2017 IEEE Intelligent Vehicles Symposium (IV)","start":{"date-parts":[[2017,6,11]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2017,6,14]]}},"container-title":["2017 IEEE Intelligent Vehicles Symposium (IV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7987634\/7995688\/07995800.pdf?arnumber=7995800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T17:26:56Z","timestamp":1569950816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7995800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ivs.2017.7995800","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}