{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:44:42Z","timestamp":1774021482354,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100004358","name":"Samsung Research Funding and the Incubation Center for Future Technology","doi-asserted-by":"publisher","award":["SRFC-TB1403-51"],"award-info":[{"award-number":["SRFC-TB1403-51"]}],"id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/tifs.2018.2812149","type":"journal-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T19:13:44Z","timestamp":1520277224000},"page":"2114-2129","source":"Crossref","is-referenced-by-count":273,"title":["VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System"],"prefix":"10.1109","volume":"13","author":[{"given":"Wonsuk","family":"Choi","sequence":"first","affiliation":[]},{"given":"Kyungho","family":"Joo","sequence":"additional","affiliation":[]},{"given":"Hyo Jin","family":"Jo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5075-7114","authenticated-orcid":false,"given":"Moon Chan","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0692-2543","authenticated-orcid":false,"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"Mathworks Classification Learner"},{"key":"ref38","first-page":"1","article-title":"Laplacian score for feature selection","author":"he","year":"2006","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.11.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00019-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.854499"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00041-2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-247-2.50037-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.130"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"ref27","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proc Int Conf Inf Process Sensor Netw (IPSN)"},{"key":"ref29","author":"davidson","year":"2016","journal-title":"Smartwatch User Identification as a Means of Authentication"},{"key":"ref2","year":"2017","journal-title":"Future Advances in Body Electronics"},{"key":"ref1","year":"2017","journal-title":"Growing Number of ECUS Forces New Approach to Cars Electrical Architecture"},{"key":"ref20","author":"das","year":"2015","journal-title":"Exploring ways to mitigate sensor-based smartphone fingerprinting"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2197746"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"ref24","year":"2017","journal-title":"Cantact The Open Source Car Tool"},{"key":"ref23","first-page":"13","article-title":"Detection of transient in radio frequency fingerprinting using signal phase","author":"hall","year":"2003","journal-title":"Optical Wireless Communication"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994573"},{"key":"ref25","first-page":"1","article-title":"Hopping on the can bus: Automotive security and the CANard toolkit","author":"evenchick","year":"2015","journal-title":"Black Hat Asia"},{"key":"ref50","year":"2017","journal-title":"Arduino Uno"},{"key":"ref51","year":"2017","journal-title":"CAN-BUS Shield V1 2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.349"},{"key":"ref58","first-page":"1","article-title":"Can with flexible data-rate","author":"hartwich","year":"2012","journal-title":"Proc ICC"},{"key":"ref57","year":"2017","journal-title":"Bitscope Micro"},{"key":"ref56","year":"2017","journal-title":"IDSO Series Hantek"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223991"},{"key":"ref54","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","author":"michalevsky","year":"2014","journal-title":"Proc USENIX Security07"},{"key":"ref53","first-page":"1","article-title":"Who&#x2019;s in control of your control system? Device fingerprinting for cyber-physical systems","author":"formby","year":"2016","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref52","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref10","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref12","author":"choi","year":"2016","journal-title":"Identifying ECUs using inimitable characteristics of signals in controller area networks"},{"key":"ref13","first-page":"235","article-title":"Security threats to automotive can networks&#x2014;Practical examples and selected short-term countermeasures","author":"hoppe","year":"2008","journal-title":"Proc Int Conf Comput Safety Rel Secur"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref18","author":"sagong","year":"2017","journal-title":"Cloaking the clock emulating clock skew in controller area networks"},{"key":"ref19","first-page":"1","article-title":"An analysis of voltage drop as a security feature in controller area network","author":"kang","year":"2016","journal-title":"Proc IEMEK Symp Embedded Technol"},{"key":"ref4","first-page":"1","article-title":"Fast and vulnerable: A story of telematic failures","author":"foster","year":"2015","journal-title":"Proc USENIX Workshop Offensive Technol"},{"key":"ref3","first-page":"1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3618-9"},{"key":"ref5","first-page":"21","article-title":"Hackers remotely kill a jeep on the highway&#x2014;With me in it","volume":"7","author":"greenberg","year":"2015","journal-title":"Wired"},{"key":"ref8","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref49","year":"2017","journal-title":"The Competitiveness of Automobiles Depends on ECU Integration"},{"key":"ref9","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref46","author":"cho","year":"2017","journal-title":"Viden Attacker identification on in-vehicle networks"},{"key":"ref45","first-page":"1","article-title":"Incremental and decremental support vector machine learning","author":"cauwenberghs","year":"2000","journal-title":"Proc NIPS"},{"key":"ref48","first-page":"1","article-title":"Exploring controller area networks","author":"foster","year":"2015","journal-title":"Proc USENIX Assoc Conf"},{"key":"ref47","first-page":"1","article-title":"A survey of remote automotive attack surfaces","author":"miller","year":"2014","journal-title":"Proc Black Hat USA"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/72.914517"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8330769\/08306904.pdf?arnumber=8306904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:44:28Z","timestamp":1643179468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8306904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":59,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2812149","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}