{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:58:15Z","timestamp":1730303895960,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/vtc2024-spring62846.2024.10683076","type":"proceedings-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T17:28:12Z","timestamp":1727285292000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data"],"prefix":"10.1109","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[{"name":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ"}]},{"given":"Yaron","family":"Koral","sequence":"additional","affiliation":[{"name":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ"}]},{"given":"Kenichi","family":"Futamura","sequence":"additional","affiliation":[{"name":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2971482"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.888380"},{"volume-title":"Connected car fleet by region 2021\u20132035","year":"2022","author":"Placek","key":"ref3"},{"volume-title":"Why connected cars are the next frontier in cyber-security","year":"2023","author":"Guesgen","key":"ref4"},{"volume-title":"Hacker Disables More Than 100 Cars Remotely","year":"2010","author":"POULSEN","key":"ref5"},{"volume-title":"Hackers Remotely Kill a Jeep on the Highway - With Me in It","year":"2015","author":"Greenberg","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2015.7223297"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s21248320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023658"},{"key":"ref10","first-page":"666","article-title":"Towards adaptive anomaly","volume-title":"IEEE CCNC 2006 proceedings","author":"Sun","year":"2006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3072916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21726-5_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS.2019.8887778"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102622"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2009.5361178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"ref17","article-title":"Lte security, protocol exploits and location tracking experi-mentation with low-cost software radio","author":"Jover","year":"2016","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref19","article-title":"Web session hijacking defense technique using user information","volume":"12","author":"Hwang","year":"2022","journal-title":"Human-centric Computing and Information Sciences"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.6.10566"},{"key":"ref21","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proceedings of the 20th USENIX conference on Security","author":"Checkoway","year":"2011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2601009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2309088"},{"issue":"1","key":"ref24","first-page":"1","article-title":"Observed time difference of arrival (otdoa) positioning in 3gpp lte","volume":"1","author":"Fischer","year":"2014","journal-title":"Qualcomm White Pap"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom.2014.6918989"}],"event":{"name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","start":{"date-parts":[[2024,6,24]]},"location":"Singapore, Singapore","end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10682988\/10682819\/10683076.pdf?arnumber=10683076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T06:31:08Z","timestamp":1727332268000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10683076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/vtc2024-spring62846.2024.10683076","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}