{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:33:15Z","timestamp":1775367195792,"version":"3.50.1"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Prime Minister\u2019s Office, Singapore, through its Strategic Capability Research Centres Funding Initiative","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006512","name":"Energy Research Institute (ERI@N), Nanyang Technological University, Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006512","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/tits.2020.3000797","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T20:50:11Z","timestamp":1593550211000},"page":"7015-7029","source":"Crossref","is-referenced-by-count":117,"title":["Autonomous Vehicle: Security by Design"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-7970","authenticated-orcid":false,"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5251-288X","authenticated-orcid":false,"given":"Yaswanth","family":"Tavva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2960407"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732204"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3381-8_9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2018.04.022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref28","first-page":"21","article-title":"Automotive safety and security integration challenges","volume":"p 240","author":"glas","year":"2015","journal-title":"Automotive-Safety & Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2028364"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.011"},{"key":"ref22","year":"2014","journal-title":"NCCIC Cyber Incident Scoring System"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2018.00061"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref23","article-title":"Generic black-box end-to-end attack against state of the art API call based malware classifiers","author":"rosenberg","year":"2017","journal-title":"arXiv 1707 05970"},{"key":"ref101","year":"2015","journal-title":"Popular DDOS Attacks 1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.09.011"},{"key":"ref100","year":"2018","journal-title":"Ddos Attack on Github"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2013.6728305"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref51","author":"lemke","year":"2010","journal-title":"Embedded Security in Cars Securing Current and Future Automotive IT Applications"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/329124.329126"},{"key":"ref57","article-title":"IoT Security: Cybersecurity from IT to OT","author":"lam","year":"2016","journal-title":"NAVIGATING THE DIGITALAGE The Definitive Cybersecurity Guide for Directors and Officers"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2780172"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref54","author":"bell","year":"2018","journal-title":"A Pivotal Year for Black Hat Cyber Attacks on Connected Cars"},{"key":"ref53","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Conf Secur"},{"key":"ref52","first-page":"1","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"Proc Workshop Embedded Secur Cars (ESCAR)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19786-4_20"},{"key":"ref4","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.041"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2017.10.006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref7","year":"2016","journal-title":"Cyber Security and Resilience of Smart Cars"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633336"},{"key":"ref46","first-page":"1","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref45","first-page":"1","article-title":"A security analysis of an in-vehicle infotainment and app platform","author":"mazloom","year":"2016","journal-title":"Proc 10th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20855-8_20"},{"key":"ref47","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Secur Symp (USENIX Secur )"},{"key":"ref42","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.08.005"},{"key":"ref73","year":"2017","journal-title":"Adversarial Deep Learning for Autonomous Driving"},{"key":"ref72","first-page":"35","author":"marron","year":"2005","journal-title":"Exploring the Relationship Between Context and Privacy"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_6"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.010413.120732"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2889746"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2277890"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755734"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref60","year":"2016","journal-title":"Systems security engineering Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076470"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"ref63","first-page":"84","author":"nilsson","year":"2009","journal-title":"A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay"},{"key":"ref64","year":"2018","journal-title":"Security Planning and Risk Management"},{"key":"ref65","year":"2014","journal-title":"Socio-Technical Security Metrics"},{"key":"ref66","year":"2016","journal-title":"Assessing ICT Security Risks in Socio-Technical Systems"},{"key":"ref67","year":"2002","journal-title":"The STRIDE Threat Model"},{"key":"ref68","author":"sanchez","year":"2018","journal-title":"Securing the Connected Car Ecosystem"},{"key":"ref69","author":"rosenstatter","year":"2017","journal-title":"A State-of-the-Art Report on Vehicular Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref1","year":"2018"},{"key":"ref95","year":"2015","journal-title":"Hackers remotely kill a jeep on the highway&#x2014;with me in it"},{"key":"ref94","author":"sanchez","year":"2018","journal-title":"Securing the Connected Vehicle Ecosystem"},{"key":"ref93","year":"2014","journal-title":"OWASP Risk Rating Methodology"},{"key":"ref92","article-title":"Software vulnerability analysis","author":"krsul","year":"1998"},{"key":"ref91","first-page":"130","author":"macher","year":"2016","journal-title":"A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.2514\/6.2010-8040"},{"key":"ref102","year":"2015","journal-title":"Popular DDOS Attacks 1"},{"key":"ref98","year":"2019","journal-title":"Demo of Prius in ROS\/GAZEBO"},{"key":"ref99","article-title":"YOLOv3: An incremental improvement","author":"redmon","year":"2018","journal-title":"arXiv 1804 02767"},{"key":"ref96","year":"2015","journal-title":"Robot Simulator"},{"key":"ref97","year":"2019","journal-title":"OS-Level Virtualization Platform"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2725339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2604405"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.726"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.02.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2014.03.115"},{"key":"ref15","year":"2016","journal-title":"Intel Automotive Security Research Workshops"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/975607"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.18"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869360"},{"key":"ref84","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.004"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463305003528"},{"key":"ref85","year":"2010"},{"key":"ref86","year":"2019"},{"key":"ref87","year":"2011"},{"key":"ref88","author":"peters","year":"2017","journal-title":"Have a Safe Trip"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9599518\/09130160.pdf?arnumber=9130160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T21:37:14Z","timestamp":1645479434000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9130160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":102,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tits.2020.3000797","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}