{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:36:01Z","timestamp":1725705361248},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/vnc.2014.7013311","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:32:51Z","timestamp":1421868771000},"page":"69-76","source":"Crossref","is-referenced-by-count":5,"title":["Towards designing secure in-vehicle network architectures using community detection algorithms"],"prefix":"10.1109","author":[{"given":"Pierre","family":"Kleberger","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Nowdehi","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2014","author":"weisstein","journal-title":"Bell Number","key":"ref10"},{"year":"2014","author":"weisstein","journal-title":"Stirling number of the second kind","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1140\/epjst\/e2010-01179-1"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1103\/PhysRevE.74.036104"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1073\/pnas.122653799"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-642-23780-5_13","article-title":"Is There a Best Quality Metric for Graph Clusters","author":"almeida","year":"2011","journal-title":"Machine Learning and Knowledge Discovery in Databases LNCS 6911"},{"key":"ref18","first-page":"283","article-title":"An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic","author":"moradi","year":"2012","journal-title":"Experimental Algorithms LNCS 7276"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1073\/pnas.0601602103"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/DSNW.2013.6615528"},{"year":"2011","journal-title":"ISO 26262&#x2013;1 2011 Road vehicles - Functional safety - Part 1 Vocabulary ISO","key":"ref3"},{"year":"2014","journal-title":"E-safety Vehicle Intrusion Protected Applications (EVITA)","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/IVS.2011.5940525"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICN.2010.38"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2304656.2304661"},{"key":"ref2","first-page":"2005","author":"mahmud","year":"2005","journal-title":"In-Vehicle Network Architecture for the Next-Generation Vehicles"},{"year":"2004","journal-title":"EASIS - General Architecture Framework DO 2A","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.physrep.2009.11.002"}],"event":{"name":"2014 IEEE Vehicular Networking Conference (VNC)","start":{"date-parts":[[2014,12,3]]},"location":"Paderborn, Germany","end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6999007\/7013298\/07013311.pdf?arnumber=7013311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T23:25:31Z","timestamp":1566257131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/vnc.2014.7013311","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}