{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:41:16Z","timestamp":1730306476532,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/wpmc48795.2019.9096062","type":"proceedings-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T21:08:19Z","timestamp":1589922499000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["End-to-end security assessment framework for connected vehicles"],"prefix":"10.1109","author":[{"given":"David","family":"Evans","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Calvo","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Arroyo","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Manilla","sequence":"additional","affiliation":[]},{"given":"David","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"New 4CAN tool helps identify vulnerabilities in on-board car","year":"2019","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref12","first-page":"66","article-title":"Simulated attacks on can buses: vehicle virus","author":"nilsson","year":"2008","journal-title":"in IASTED International conference on communication systems and networks (AsiaCSN)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"journal-title":"International Standards Organization for Standardization","article-title":"ISO\/SAE CD 21434. Road Vehicles Cybersecurity engineering","year":"2019","key":"ref14"},{"key":"ref15","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"ishtiaq roufa","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"ref16","first-page":"3","article-title":"Drive it like you hacked it","volume":"23","author":"kamkar","year":"2015","journal-title":"DEF CON"},{"journal-title":"Car infotainment hacking methodology and attack surface scenarios","year":"2019","key":"ref17"},{"journal-title":"ETSI EN 302 637-2 V1 3 2","article-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service","year":"2013","key":"ref18"},{"journal-title":"Volvo adds big data to every new car it sells in the UK","year":"2019","key":"ref4"},{"key":"ref3","article-title":"Decentralised Cooperative Collision Avoidance with Reference-Free Model Predictive Control and Desired Versus Planned Trajectories","author":"wartnaby","year":"2019","journal-title":"arXiv preprint arXiv 1904 01870"},{"key":"ref6","first-page":"91","volume":"2015","author":"miller","year":"2015","journal-title":"Remote exploitation of an unaltered passenger vehicle"},{"journal-title":"Earn as you drive with Jaguar Land Rover","year":"2019","key":"ref5"},{"journal-title":"Statista connected car report 2018","year":"2019","key":"ref8"},{"journal-title":"Teslas Are Proven Vulnerable To GPS Spoofing Attacks","year":"2019","key":"ref7"},{"key":"ref2","article-title":"State of AI Report","author":"nathan benaich","year":"2019","journal-title":"stateof ai Tech Rep"},{"year":"2019","key":"ref1","article-title":"Argo AI crunchbase information"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4271\/R-361"}],"event":{"name":"2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)","start":{"date-parts":[[2019,11,24]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2019,11,27]]}},"container-title":["2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9093082\/9096056\/09096062.pdf?arnumber=9096062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:08:52Z","timestamp":1657854532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9096062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wpmc48795.2019.9096062","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}