{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:09:43Z","timestamp":1730282983789,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1109\/mmar55195.2022.9874288","type":"proceedings-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T16:07:54Z","timestamp":1662653274000},"page":"232-237","source":"Crossref","is-referenced-by-count":2,"title":["Incident Management Process Model for Automotive CyberSafety Systems Using the Business Process Model and Notation"],"prefix":"10.1109","author":[{"given":"Piotr","family":"Piatek","sequence":"first","affiliation":[{"name":"AGH University of Science and Technology APTIV Services Poland S.A.,Faculty of Electrical Engineering, Automatics, Computer Science and Biomedical Engineering,Krakow,Poland"}]}],"member":"263","reference":[{"year":"2019","author":"zhang","journal-title":"Study on Incident Response System of Automotive Cybersecurity","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/en14133816"},{"year":"2021","journal-title":"UNECE","article-title":"UN Regulation No. 155 - Uniform provisions concerning the approval of vehicles with regards to yber security and cyber security management system","key":"ref12"},{"year":"2021","journal-title":"Iso\/sae","article-title":"ISO\/SAE DIS 21434 Road vehicles - Cybersecurity engineering","key":"ref13"},{"year":"2021","journal-title":"SAE","article-title":"Cybersecurity Guidebook for Cyber-Physical Vehicle Systems J3061_201601","key":"ref14"},{"year":"2020","journal-title":"VDA QMC","article-title":"Automotive Cybersecurity Management System Audit 1st edition, December 2020","key":"ref15"},{"year":"2012","author":"cichonski nist","journal-title":"SP 800&#x2013;61 Rev 2 -Computer Security Incident Handling Guide","key":"ref16"},{"year":"2019","journal-title":"ISO\/PAS","article-title":"ISO\/PAS 21448 Road vehicles - Safety of the intended functionality","key":"ref17"},{"key":"ref18","article-title":"INTERNATIONAL STANDARD 26262 Road vehicles - Functional Safety","volume":"2018","year":"2018","journal-title":"ISO"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CISP-BMEI48845.2019.8965948"},{"year":"2021","journal-title":"Guard Knox","article-title":"Zonal Architecture: The Foundation for Next-Generation Vehicles","key":"ref4"},{"year":"2018","journal-title":"Upstream Security","article-title":"Global Automotive Cybersecurity","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/PDP52278.2021.00050"},{"year":"2022","journal-title":"Guard Knox","article-title":"The Automotive Paradigm Shift & theRise of The Cybertech Tier","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICTCS.2019.8923077"},{"year":"2017","journal-title":"ENISA","article-title":"Cyber Security and Resilience of smart cars","key":"ref7"},{"year":"2021","journal-title":"Upstream Security","article-title":"Upstream Security's 2021 Global Automotive Cybersecurity Report","key":"ref2"},{"year":"2021","journal-title":"SAE","article-title":"Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles J3016_202104","key":"ref9"},{"year":"2018","journal-title":"PWC","article-title":"The 2018 Strategy & Digital Auto Report","key":"ref1"},{"year":"2022","journal-title":"ISO\/PAS","article-title":"ISO\/PAS 5112 Road vehicles - Guidelines for auditing cybersecurity engineering","key":"ref20"},{"year":"2011","journal-title":"Object Management Group","article-title":"Business Process Model and Notation (BPMN) Version 2.0","key":"ref22"},{"year":"0","journal-title":"ISO\/AWI ISO\/AWI TS 5083","article-title":"Road vehicles - Safety for automated driving systems &#x2014; Design, verification and validation","key":"ref21"},{"key":"ref24","article-title":"Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems","volume":"85","author":"nassi","year":"2020","journal-title":"IACR Cryptology ePrint Archive"},{"year":"0","journal-title":"Bizagi Modeler","key":"ref23"}],"event":{"name":"2022 26th International Conference on Methods and Models in Automation and Robotics (MMAR)","start":{"date-parts":[[2022,8,22]]},"location":"Mi\u0119dzyzdroje, Poland","end":{"date-parts":[[2022,8,25]]}},"container-title":["2022 26th International Conference on Methods and Models in Automation and Robotics (MMAR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9873851\/9874261\/09874288.pdf?arnumber=9874288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T17:13:53Z","timestamp":1664212433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9874288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mmar55195.2022.9874288","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]}}}