{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:14:09Z","timestamp":1768972449317,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tr.2024.3373810","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:12:44Z","timestamp":1711393964000},"page":"1216-1230","source":"Crossref","is-referenced-by-count":8,"title":["Cyberattacks on Adaptive Cruise Controls and Emergency Braking Systems: Adversary Models, Impact Assessment, and Countermeasures"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7646-7825","authenticated-orcid":false,"given":"Adriana","family":"Berdich","sequence":"first","affiliation":[{"name":"Faculty of Automation and Computing, Politehnica University of Timisoara, Timisoara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3078-3635","authenticated-orcid":false,"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[{"name":"Faculty of Automation and Computing, Politehnica University of Timisoara, Timisoara, Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref2","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. USENIX Secur. Symp.","author":"Checkoway","year":"2011"},{"key":"ref3","first-page":"1","article-title":"A survey of remote automotive attack surfaces","author":"Miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref4","first-page":"1","article-title":"Free-fall: Hacking Tesla from wireless to CAN bus","volume":"25","author":"Nie","year":"2017","journal-title":"Briefing Black Hat USA"},{"issue":"1","key":"ref5","first-page":"1","article-title":"Specification of secure onboard communication,","volume":"4","year":"2017"},{"key":"ref6","volume-title":"Specification of Intrusion Detection System Protocol","year":"2020"},{"key":"ref7","article-title":"ISO\/SAE 21434: Road vehiclescybersecurity engineering","year":"2020"},{"key":"ref8","article-title":"Addendum 154UN regulation no. 155: Uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4271\/j3016_201609"},{"key":"ref10","volume-title":"Automotive Software and Electronics 2030","author":"Ondrej","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref12","first-page":"60","article-title":"OCTANE: An extensible open source car security testbed","volume-title":"Proc. Embedded Secur. Cars Conf.","author":"Borazjani","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2869351"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41025-4_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865169"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3051026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref22","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Sun","year":"2020"},{"key":"ref23","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Europe"},{"key":"ref24","article-title":"Heterogeneous runtime verification of safety critical cyber physical systems","author":"Gautham","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55583-2_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209645"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690734"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3030251"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3011698"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983392"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2846741"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3020845"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC48692.2020.9161645"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2999533"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3137826"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2934481"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3074318"},{"key":"ref39","article-title":"Test protocolAEB VRU systems, version 3.0.3","volume-title":"Vulnerable Road User (VRU) Protection","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3054934"},{"key":"ref41","first-page":"4259","article-title":"CANARY-a reactive defense mechanism for controller area networks based on active relays","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Groza","year":"2021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02067-4_1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000797"},{"key":"ref44","article-title":"ISO 26262-3:2018 Road Vehicles  Functional Safety  Part 3: Concept Phase","year":"2018"},{"key":"ref45","volume-title":"World Report on Road Traffic Injury Prevention","author":"Peden","year":"2004"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.iatssr.2014.08.001"},{"key":"ref47","volume-title":"The Role of Speed in the Frequency and Severity of Road Traffic Collisions","author":"McKibbin"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3141\/1773-13"},{"key":"ref49","volume-title":"Relationship Between Speed and Risk of Fatal Injury: Pedestrians and Car Occupants","author":"Richards","year":"2010"},{"key":"ref50","volume-title":"Why Adopt Model-Based Design?l","year":"2021"},{"key":"ref51","article-title":"Model-based design for safety-related applications","author":"Fey","year":"2008"},{"key":"ref52","article-title":"Siemens broadens MBSE to engineer beyond individual autonomous vehicles","year":"2021","journal-title":"CIMdata"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10547161\/10478772.pdf?arnumber=10478772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:59:47Z","timestamp":1733878787000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10478772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":52,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3373810","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}