{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:16:45Z","timestamp":1759331805595,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/vtcfall.2018.8690644","type":"proceedings-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T22:56:28Z","timestamp":1555368988000},"page":"1-5","source":"Crossref","is-referenced-by-count":18,"title":["Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Zachariah","family":"Tyree","sequence":"first","affiliation":[]},{"given":"Robert A.","family":"Bridges","sequence":"additional","affiliation":[]},{"given":"Frank L.","family":"Combs","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Moore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Data-driven extraction of vehicle states from CAN bus traffic for cyber protection and safety","author":"moore","year":"0","journal-title":"Consumer Electronics Magazine"},{"key":"ref11","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref15","first-page":"226","article-title":"Applying intrusion detection to automotive it-early insights and remaining challenges","volume":"4","author":"hoppe","year":"2009","journal-title":"Journal of Information Assurance and Security (JIAS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref18","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Usenix Security Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref28","first-page":"682","article-title":"Using the Nystr&#x00F6;m method to speed up kernel machines","author":"williams","year":"2001","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"ref27","article-title":"An introduction to diffusion maps","author":"de la porte","year":"2008","journal-title":"Proc PRASA"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2239301"},{"key":"ref29","first-page":"476","article-title":"Nystr&#x00F6;m method vs random fourier features: A theoretical and empirical comparison","author":"yang","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0111"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00008"},{"key":"ref2","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"ref1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Usenix Security Symp"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2018.2810232","article-title":"Identifying ECUs through inimitable characteristics of signals in controller area networks","author":"choi","year":"2018","journal-title":"IEEE Trans Vehicular Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1654"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502550"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2006.04.006"},{"key":"ref25","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)","start":{"date-parts":[[2018,8,27]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2018,8,30]]}},"container-title":["2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672788\/8690547\/08690644.pdf?arnumber=8690644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T12:49:39Z","timestamp":1607258979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8690644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2018.8690644","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}