{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:50Z","timestamp":1762004990492,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3056791","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Protecting an automobile network using distributed firewall system"],"prefix":"10.1145","author":[{"given":"Syed","family":"Rizvi","sequence":"first","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Jonathan","family":"Willett","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Donte","family":"Perino","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Tyler","family":"Vasbinder","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Seth","family":"Marasco","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.350"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413174"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"e_1_3_2_1_6_1","unstructured":"Studnia Ivan etal \"Security of embedded automotive networks: state of the art and a research proposal.\" SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety Reliability and Security. https:\/\/hal.archives-ouvertes.fr\/hal-00848234\/document.  Studnia Ivan et al. \"Security of embedded automotive networks: state of the art and a research proposal.\" SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety Reliability and Security. https:\/\/hal.archives-ouvertes.fr\/hal-00848234\/document."},{"key":"e_1_3_2_1_7_1","unstructured":"\"Karamba - Our Approach\". Karambasecurity.com. N.p. 2016. Web.  \"Karamba - Our Approach\". Karambasecurity.com. N.p. 2016. Web."},{"key":"e_1_3_2_1_8_1","unstructured":"A. Weimerskirch and C. Paar et al. \"Security in automotive bus systems.\" Workshop on Embedded Security in Cars  A. Weimerskirch and C. Paar et al. \"Security in automotive bus systems.\" Workshop on Embedded Security in Cars"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3056791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:55Z","timestamp":1750220635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":8,"alternative-id":["10.1145\/3018896.3056791","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3056791","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}