{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:03:00Z","timestamp":1771333380998,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006351","name":"Sheila and Robert Challey Institute for Global Innovation and Growth at North Dakota State University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,5,15]]},"DOI":"10.1109\/jiot.2022.3209687","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:53:19Z","timestamp":1664308399000},"page":"8348-8356","source":"Crossref","is-referenced-by-count":16,"title":["A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3804-997X","authenticated-orcid":false,"given":"Asad Waqar","family":"Malik","sequence":"first","affiliation":[{"name":"Department of Computing, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4608-4305","authenticated-orcid":false,"given":"Zahid","family":"Anwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Dakota State University, Fargo, ND, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8306-475X","authenticated-orcid":false,"given":"Anis U.","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Computing, National University of Sciences and Technology, Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3359999.3360492"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380558"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/wivec.2013.6698224"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3181027"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3063678"},{"key":"ref11","first-page":"19","article-title":"Wanna drive? Feasible attack paths and effective protection against ransomware in modern vehicles","author":"wolf","year":"2017","journal-title":"Proc Embedded Security Cars Conf (ESCAR) Europe"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937576"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2994836"},{"key":"ref2","author":"hull","year":"2016","journal-title":"Nissan Disables Leaf Electric Car App After Revelation That Hackers Can Switch on the Heater to Drain the Battery"},{"key":"ref1","first-page":"21","article-title":"Hackers remotely kill a jeep on the highway&#x2014;With me in it","volume":"7","author":"greenberg","year":"2015","journal-title":"Wired"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034327"},{"key":"ref16","article-title":"Intrusion detection system using deep neural network for in-vehicle network security","volume":"11","author":"kang","year":"2016","journal-title":"PLoS ONE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1115\/1.4052823"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTLatinAmerica52371.2021.9543031"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4191-3_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171092"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3284748"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071450"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924331"},{"key":"ref28","year":"2021","journal-title":"What We Know About the Darkside Ransomware and the us Pipeline Attack"},{"key":"ref27","year":"2021","journal-title":"Darkside Ransomware Best Practices for Preventing Bus Disruption From Ransomware Attacks"},{"key":"ref29","year":"2022","journal-title":"Mitre Att&Ck Framework ATT&CK Matrix for Enterprise"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102625"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963725"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.2965497"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4135\/9781529789768"},{"key":"ref3","year":"2021","journal-title":"The Year of Ransomware Continues"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2919865"},{"key":"ref5","first-page":"272","article-title":"Threat modeling and attack simulations of connected vehicles: Proof of concept","author":"xiong","year":"2019","journal-title":"Proc Int Conf Inf Syst Security Privacy"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10119650\/09903807.pdf?arnumber=9903807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:40:47Z","timestamp":1685382047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9903807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":32,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3209687","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}