{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T18:39:03Z","timestamp":1772476743140,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1109\/vnc61989.2024.10575970","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T18:10:48Z","timestamp":1719943848000},"page":"269-270","source":"Crossref","is-referenced-by-count":5,"title":["Cybersecurity Metrics for AI-Based In-Vehicle Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Mohammed Lamine","family":"Bouchouia","sequence":"first","affiliation":[{"name":"IRT-SystemX"}]},{"given":"Hamza","family":"Khemissa","sequence":"additional","affiliation":[{"name":"Expleo France"}]},{"given":"Elies","family":"Gherbi","sequence":"additional","affiliation":[{"name":"IRT-SystemX"}]},{"given":"Myriam","family":"Tami","sequence":"additional","affiliation":[{"name":"CentraleSupelec"}]},{"given":"Duncan","family":"Lopes","sequence":"additional","affiliation":[{"name":"Sherpa Engineering"}]},{"given":"Natasha","family":"Alkhatib","sequence":"additional","affiliation":[{"name":"ETAS"}]},{"given":"Maxime","family":"Ayrault","sequence":"additional","affiliation":[{"name":"Valeo"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071072"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.004"},{"key":"ref3","article-title":"Canet: An unsupervised intrusion detection system for high dimensional CAN bus data","volume":"abs\/1906.02492","author":"Hanselmann","year":"2019","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8814124"},{"key":"ref6","author":"Mohseni","year":"2019","journal-title":"Practical solutions for machine learning safety in autonomous vehicles"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454752"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590786"},{"key":"ref9","volume-title":"Iso 26262: Road vehicles - functional safety","year":"2018"},{"key":"ref10","author":"Chalapathy","year":"2019","journal-title":"Deep learning for anomaly detection: A survey"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100586"},{"key":"ref12","first-page":"1","article-title":"Introduction to the controller area network (can)","volume-title":"Application Report SLOA101","author":"HPL","year":"2002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0296879"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app12168162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119771"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10080893"},{"key":"ref18","author":"Ajibuwa","year":"2023","journal-title":"A survey on ai\/ml-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities"},{"key":"ref19","volume-title":"CVSS v3.1 Specification Document","year":"2024"},{"key":"ref20","volume-title":"Common Vulnerability Scoring System Version 3.1 Calculator","year":"2024"},{"key":"ref21","volume-title":"SynCAN","year":"2024"},{"key":"ref22","volume-title":"Real ORNL Automotive Dynamometer (ROAD) CAN Intrusion Dataset","author":"Hollifield","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref24","volume-title":"Cyber resiliency metrics catalog","author":"Bodeau","year":"2018"}],"event":{"name":"2024 IEEE Vehicular Networking Conference (VNC)","location":"Kobe, Japan","start":{"date-parts":[[2024,5,29]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574872\/10575940\/10575970.pdf?arnumber=10575970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T04:20:38Z","timestamp":1720066838000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/vnc61989.2024.10575970","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]}}}