{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:33:23Z","timestamp":1775367203192,"version":"3.50.1"},"reference-count":8,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/lsp.2014.2304139","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T19:01:28Z","timestamp":1391194888000},"page":"395-399","source":"Crossref","is-referenced-by-count":132,"title":["Source Identification Using Signal Characteristics in Controller Area Networks"],"prefix":"10.1109","volume":"21","author":[{"given":"Pal-Stefan","family":"Murvay","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref3","article-title":"Radio frequency fingerprinting for intrusion detection in wireless networks","author":"hall","year":"2005","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref6","article-title":"Security, and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"rouf","year":"2010","journal-title":"Proc Usenix Security Symp"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2252898"},{"key":"ref8","article-title":"CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"2011","journal-title":"Embedded Security in Cars Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2197746"},{"key":"ref1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of USENIX Security 2011"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/6732989\/06730667.pdf?arnumber=6730667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:35Z","timestamp":1642004975000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6730667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":8,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2014.2304139","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"value":"1070-9908","type":"print"},{"value":"1558-2361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}