{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:58:16Z","timestamp":1771919896556,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/mtits.2015.7223297","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T21:52:57Z","timestamp":1440712377000},"page":"477-482","source":"Crossref","is-referenced-by-count":48,"title":["Security issues and vulnerabilities in connected car systems"],"prefix":"10.1109","author":[{"given":"Tamas","family":"Becsi","sequence":"first","affiliation":[]},{"given":"Szilard","family":"Aradi","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Gaspar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Autoevolution Darpa hacked a chevy impala through its onstar system"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref12","article-title":"Security in automotive bus systems","author":"wolf","year":"0","journal-title":"Proceedings of the Workshop on Embedded Security in Cars 2004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88181-0_11"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.21917\/ijct.2014.0122","article-title":"Analysis of android vulnerabilities and modern exploitation techniques","volume":"5","author":"shewale","year":"2014","journal-title":"ICTACT JOURNAL on COMMUNICATIon TECHNOLOGY"},{"key":"ref15","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"ref17","article-title":"Wirelurker: A new era in ios and os x malware","author":"xiao","year":"0"},{"key":"ref18","year":"0","journal-title":"CVE Details Apple iphone os Vulnerability statistics"},{"key":"ref19","article-title":"Bluetooth: With low energy comes low security","author":"ryan","year":"2013","journal-title":"WOOT"},{"key":"ref4","article-title":"National transportation statistics 2014","year":"2014","journal-title":"U S Department of Transportation Bureau of Transportation Statistics"},{"key":"ref3","first-page":"2014","year":"0"},{"key":"ref6","author":"miller","year":"0","journal-title":"Adventures in Automotive Networks and Control Units"},{"key":"ref5","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref8","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"ishtiaq roufa","year":"2010","journal-title":"19th USENIX Security Symposium Washington DC USA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref9","author":"spaar beemer","year":"0","journal-title":"open thyself! security vulnerabilities in bmw's connecteddrive c't magazin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"ref22","first-page":"477","article-title":"A survey of threats and security measures for data transmission over GSM\/UMTS networks","author":"fischer","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.1.6.18-27"},{"key":"ref24","year":"0","journal-title":"Staff of Ed Markey Tracking & hacking Security & privacy gaps put american drivers at risk"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856548"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/1687-3963-2007-074706"}],"event":{"name":"2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS)","location":"Budapest, Hungary","start":{"date-parts":[[2015,6,3]]},"end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7175475\/7223230\/07223297.pdf?arnumber=7223297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T22:49:19Z","timestamp":1567118959000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7223297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mtits.2015.7223297","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}