{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:33Z","timestamp":1762005093077,"version":"3.37.3"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/mc.2019.2891334","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T19:22:45Z","timestamp":1552504965000},"page":"66-70","source":"Crossref","is-referenced-by-count":8,"title":["Vehicle Telematics: The Good, Bad and Ugly"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9451-1527","authenticated-orcid":false,"given":"Hal","family":"Berghel","sequence":"first","affiliation":[{"name":"Computer Science, University of Nevada, Las Vegas, United States"}]}],"member":"263","reference":[{"key":"ref10","first-page":"77","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"0","journal-title":"Proc Usenix Security Symp"},{"journal-title":"Proof-of-Concept CarShark Software Hacks Car Computers Shutting Down Brakes Engines and More","year":"2010","author":"boyle","key":"ref11"},{"key":"ref12","article-title":"The greatest hits of Samy Kamkar, YouTube&#x2019;s favorite hacker","author":"greenberg","year":"2015","journal-title":"Wired"},{"journal-title":"Drive it like you hacked it New attacks and tools to wirelessly steal cars","year":"2015","key":"ref13"},{"key":"ref14","article-title":"This hacker&#x2019;s tiny device unlocks cars and opens garages","author":"greenberg","year":"2015","journal-title":"Wired"},{"journal-title":"Data could be what Ford sells next as it looks for new revenue","year":"2018","author":"howard","key":"ref15"},{"journal-title":"Click Here to Kill Everybody Security and Survival in a Hyper-Connected World","year":"2018","author":"schneier","key":"ref16"},{"key":"ref17","article-title":"Your apps know where you were last night, and they&#x2019;re not keeping it secret","author":"devries","year":"2018","journal-title":"New York Times"},{"journal-title":"Dutch government report says Microsoft Office telemetry collection breaks GDPR","year":"2018","author":"cimpanu","key":"ref18"},{"journal-title":"With Hacking Music Can Take Control of Your Car","year":"2011","author":"mcmillan","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330315"},{"journal-title":"OnStar kills its terrible plan to monitor non-customers&#x2019; driving","year":"2011","author":"hill","key":"ref6"},{"journal-title":"Court to FBI No spying on in-car computers","year":"2003","author":"mccullagh","key":"ref5"},{"journal-title":"All your devices can be hacked","year":"2011","key":"ref8"},{"key":"ref7","article-title":"Politicians come and go after serving corruption sentences","author":"morrison","year":"2010","journal-title":"Las Vegas Rev J"},{"key":"ref2","article-title":"Hacker disables more than 100 cars remotely","author":"poulsen","year":"2010","journal-title":"Wired"},{"key":"ref1","article-title":"The talk of Las Vegas is Operation G-String","author":"johnson","year":"2003","journal-title":"Los Angeles Times"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/8666442\/08666649.pdf?arnumber=8666649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:51:11Z","timestamp":1657745471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":18,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mc.2019.2891334","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}