{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:33:25Z","timestamp":1760132005697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,12]],"date-time":"2008-05-12T00:00:00Z","timestamp":1210550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,12]]},"DOI":"10.1145\/1413140.1413170","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T13:03:19Z","timestamp":1222779799000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Automotive system security"],"prefix":"10.1145","author":[{"given":"R. R.","family":"Brooks","sequence":"first","affiliation":[{"name":"Clemson University, SC"}]},{"given":"S.","family":"Sander","sequence":"additional","affiliation":[{"name":"Clemson University, SC"}]},{"given":"J.","family":"Deng","sequence":"additional","affiliation":[{"name":"Clemson University, SC"}]},{"given":"J.","family":"Taiber","sequence":"additional","affiliation":[{"name":"Information Technology Research Center, Greenville, SC"}]}],"member":"320","published-online":{"date-parts":[[2008,5,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Bono S. Green M. and Stubblefield A. 2005. Security Analysis of A Cryptographically-Enabled RFID Device. In proceeding of the Usenix Security Symposium (The Baltimore The MD. The US. August 01--06 2005). Bono S. Green M. and Stubblefield A. 2005. Security Analysis of A Cryptographically-Enabled RFID Device. In proceeding of the Usenix Security Symposium (The Baltimore The MD. The US. August 01--06 2005)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Hanger C. T. and Midkiff S. F. 2003. An Analysis of Bluetooth Security Vulnerablities. In proceeding of Wireless Communication and Networking 3 1825--1831. Hanger C. T. and Midkiff S. F. 2003. An Analysis of Bluetooth Security Vulnerablities. In proceeding of Wireless Communication and Networking 3 1825--1831.","DOI":"10.1109\/WCNC.2003.1200664"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2004.838829"},{"volume-title":"Securing Vehicular Ad Hoc Networks. International Conference on Pervasive Computing and Application, 424--429","author":"Liu X.","key":"e_1_3_2_2_4_1","unstructured":"Liu X. , and Fang Z . 2007 . Securing Vehicular Ad Hoc Networks. International Conference on Pervasive Computing and Application, 424--429 , Liu X., and Fang Z. 2007. Securing Vehicular Ad Hoc Networks. International Conference on Pervasive Computing and Application, 424--429,"},{"key":"e_1_3_2_2_5_1","unstructured":"Howard D. and Longstaff T. 1998. A common Language for Computer Security Incidents. SAND98--8867 Sandia National Laboratory. Howard D. and Longstaff T. 1998. A common Language for Computer Security Incidents. SAND98--8867 Sandia National Laboratory."},{"key":"e_1_3_2_2_6_1","volume-title":"Disruptive Security Technologies: with Mobile Code and Peer-to-Peer Networks","author":"Brooks R.","year":"2005","unstructured":"Brooks , R. Disruptive Security Technologies: with Mobile Code and Peer-to-Peer Networks . 2005 . CRC Press , Boca Raton, FLA. Brooks, R. Disruptive Security Technologies: with Mobile Code and Peer-to-Peer Networks. 2005. CRC Press, Boca Raton, FLA."},{"key":"e_1_3_2_2_7_1","volume-title":"M","author":"Lemke K.","year":"2006","unstructured":"Lemke K. , Paar C. , and Wolf eds M . 2006 . Embedded Security in Cars. Springer Verlag , Berlin. Lemke K., Paar C., and Wolf eds M. 2006. Embedded Security in Cars. Springer Verlag, Berlin."}],"event":{"name":"CSIIRW '08: Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '08","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1413140.1413170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1413140.1413170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:12Z","timestamp":1750253412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1413140.1413170"}},"subtitle":["challenges and state-of-the-art"],"short-title":[],"issued":{"date-parts":[[2008,5,12]]},"references-count":7,"alternative-id":["10.1145\/1413140.1413170","10.1145\/1413140"],"URL":"https:\/\/doi.org\/10.1145\/1413140.1413170","relation":{},"subject":[],"published":{"date-parts":[[2008,5,12]]},"assertion":[{"value":"2008-05-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}