{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:33Z","timestamp":1750306593577,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2735960.2735992","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T12:41:01Z","timestamp":1430829661000},"page":"252-253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Cyber-physical security for smart cars"],"prefix":"10.1145","author":[{"given":"Abdulmalik","family":"Humayed","sequence":"first","affiliation":[{"name":"The University of Kansas, Lawrence, KS"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium","author":"Checkoway S.","year":"2011","unstructured":"S. Checkoway , D. McCoy , B. Kantor , D. Anderson , H. Shacham , S. Savage , K. Koscher , A. Czeskis , F. Roesner , and T. Kohno . Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security Symposium , 2011 . S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"NDSS","author":"Francillon A.","year":"2011","unstructured":"A. Francillon , B. Danev , S. Capkun , S. Capkun , and S. Capkun . Relay attacks on passive keyless entry and start systems in modern cars . In NDSS , 2011 . A. Francillon, B. Danev, S. Capkun, S. Capkun, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_4_1","first-page":"11","volume-title":"19th USENIX Security Symposium, Washington DC","author":"Ishtiaq Roufa R. M.","year":"2010","unstructured":"R. M. Ishtiaq Roufa , H. Mustafaa , S. O. Travis Taylora , W. Xua , M. Gruteserb , W. Trappeb , and I. Seskarb . Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study . In 19th USENIX Security Symposium, Washington DC , pages 11 -- 13 , 2010 . R. M. Ishtiaq Roufa, H. Mustafaa, S. O. Travis Taylora, W. Xua, M. Gruteserb, W. Trappeb, and I. Seskarb. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In 19th USENIX Security Symposium, Washington DC, pages 11--13, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Security in Computing","author":"Peeger C. P.","year":"2006","unstructured":"C. P. Peeger and S. L. Peeger . Security in Computing ( 4 th Edition). Prentice Hall PTR , 2006 . C. P. Peeger and S. L. Peeger. Security in Computing (4th Edition). Prentice Hall PTR, 2006.","edition":"4"}],"event":{"name":"ICCPS '15: ACM\/IEEE 6th International Conference on Cyber-Physical Systems","sponsor":["IEEE","IEEE-CSS Control Systems Society","IEEE-CS\\TCRT TC on Real-Time Systems","IEEE Signal Processing Society","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Seattle Washington","acronym":"ICCPS '15"},"container-title":["Proceedings of the ACM\/IEEE Sixth International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2735960.2735992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2735960.2735992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:36Z","timestamp":1750227396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2735960.2735992"}},"subtitle":["taxonomy of vulnerabilities, threats, and attacks"],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":5,"alternative-id":["10.1145\/2735960.2735992","10.1145\/2735960"],"URL":"https:\/\/doi.org\/10.1145\/2735960.2735992","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}