{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T00:02:47Z","timestamp":1766275367466,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Aerosp. Electron. Syst."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/taes.2019.2961824","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T21:18:36Z","timestamp":1577827116000},"page":"3010-3027","source":"Crossref","is-referenced-by-count":27,"title":["Intrusion Detection System for the MIL-STD-1553 Communication Bus"],"prefix":"10.1109","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0881-5768","authenticated-orcid":false,"given":"Orly","family":"Stan","sequence":"first","affiliation":[]},{"given":"Adi","family":"Cohen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-128X","authenticated-orcid":false,"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-4059","authenticated-orcid":false,"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","article-title":"Scikit-learn: Machine learning in python","key":"ref33"},{"year":"1999","author":"hall","article-title":"Correlation-based feature selection for machine learning, Unive. Waikato Hamilton","key":"ref32"},{"year":"0","article-title":"Weka: Data mining software in java","key":"ref31"},{"key":"ref30","first-page":"171?174","article-title":"A Markov chain model of temporal behavior for anomaly detection","author":"ye","year":"0","journal-title":"Proc IEEE Syst Man Cybern\/ Inf Assurance Secur Workshop"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TAES.2019.2914519"},{"key":"ref11","article-title":"Security in automotive bus systems","author":"wolf","year":"0","journal-title":"Proceedings of the Workshop on Embeded Security on Cars"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/IVS.2011.5940525"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref14","article-title":"Lcap-a lightweight can authentication protocol for securing in-vehicle networks","volume":"6","author":"hazem","year":"0","journal-title":"Proc 10th Escar Embedded Secur Cars Conf"},{"key":"ref15","first-page":"5","article-title":"Security authentication system for in-vehicle network","volume":"81","author":"ueda","year":"2015","journal-title":"SEI Tech Rev"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3055004.3055016"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/IVS.2011.5940552"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref19","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"0","journal-title":"Proc 25th Usenix Security Symp"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.cose.2008.08.003"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/AERO.2008.4526551"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1371\/journal.pone.0155781"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/DASC.2004.1390775"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/AUTEST.2018.8532549"},{"year":"0","article-title":"Tsfresh","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/DASC.2008.4702761"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IMCEC.2018.8469483"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/CYCONUS.2017.8167508"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-030-16874-2_11"},{"year":"2019","author":"losier","article-title":"Design of a time-based intrusion detection algorithm for the mil-std-1553","key":"ref9"},{"year":"1998","journal-title":"MIL-STD-1553 Designer's Guide&#x2014;Data Device Corporation","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/STA.2016.7952095"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MNET.2019.1900196"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1017\/CBO9781107298019"},{"key":"ref24","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"roufa","year":"0","journal-title":"Proc 19th USENIX Security Symp"},{"key":"ref23","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"0","journal-title":"Proc Usenix Secur Symp"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"ref25","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"}],"container-title":["IEEE Transactions on Aerospace and Electronic Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7\/9161247\/08946705.pdf?arnumber=8946705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:41:48Z","timestamp":1651066908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8946705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/taes.2019.2961824","relation":{},"ISSN":["0018-9251","1557-9603","2371-9877"],"issn-type":[{"type":"print","value":"0018-9251"},{"type":"electronic","value":"1557-9603"},{"type":"electronic","value":"2371-9877"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}