{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:13:08Z","timestamp":1770898388599,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/wpmc55625.2022.10014951","type":"proceedings-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T19:12:29Z","timestamp":1674241949000},"page":"436-441","source":"Crossref","is-referenced-by-count":4,"title":["Closing the Security Gaps in SOME\/IP Through Implementation of a Host-Based Intrusion Detection System"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Casparsen","sequence":"first","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Daniel Greth","family":"Sorensen","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Jeppe Nellemann","family":"Andersen","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Jonas Ingerslev","family":"Christensen","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Panagiotis","family":"Antoniou","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Rolf","family":"Kroyer","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Tatiana","family":"Madsen","sequence":"additional","affiliation":[{"name":"Aalborg University,Department of Electronic Systems,Denmark"}]},{"given":"Karsten","family":"Gjoerup","sequence":"additional","affiliation":[{"name":"MAXSYT Technologies ApS,Denmark"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3922-5.ch016"},{"key":"ref2","year":"2019","journal-title":"Controller Area Network (CAN) Overview"},{"key":"ref3","article-title":"Remote Exploitation of an Unaltered Passenger Vehicle","author":"Miller","year":"2015","journal-title":"academia.edu"},{"key":"ref4","article-title":"Scalable service-Oriented MiddlewarE over IP (SOME\/IP)","author":"Volker","year":"2019","journal-title":"some-ip.com"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502991"},{"key":"ref10","article-title":"SOME\/IP Protocol Specification","year":"2019","journal-title":"Available: autosar.org"},{"key":"ref11","article-title":"Comprehen-sive Experimental Analyses of Automotive Attack Surfaces","volume-title":"SEC11 Proceedings of the 20th USENIX conference on Security","author":"Checkoway","year":"2011"},{"key":"ref12","article-title":"An implementation of Scalable service-Oriented MiddlewarE over IP","year":"2019"},{"key":"ref13","article-title":"HCRL-Hacking and Countermeasure Research Lab","year":"2019","journal-title":"ocslab.hksecurity.net\/Datasets"}],"event":{"name":"2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)","location":"Herning, Denmark","start":{"date-parts":[[2022,10,30]]},"end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10014682\/10014702\/10014951.pdf?arnumber=10014951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:55:43Z","timestamp":1707807343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10014951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wpmc55625.2022.10014951","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}