{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:04:01Z","timestamp":1766732641730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Energy","award":["DE-AC05-00OR22725"],"award-info":[{"award-number":["DE-AC05-00OR22725"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3309171.3309180","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"31-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Towards a CAN IDS Based on a Neural Network Data Field Predictor"],"prefix":"10.1145","author":[{"given":"Krzysztof","family":"Pawelec","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Robert A.","family":"Bridges","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Frank L.","family":"Combs","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Robert Bosch GmbH. 1991. CAN Specification Version 2.0. (1991).  Robert Bosch GmbH. 1991. CAN Specification Version 2.0. (1991)."},{"volume-title":"USENIX Security Symposium","author":"Stephen","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"volume-title":"USENIX Security Symp. 911--927","year":"2016","author":"Cho Kyong-Tak","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Wonsuk Choi and others. `18. Identifying ECUs through Inimitable Characteristics of Signals in Controller Area Networks. IEEE Trans. Vehic. Tech. ( `18).  Wonsuk Choi and others. `18. Identifying ECUs through Inimitable Characteristics of Signals in Controller Area Networks. IEEE Trans. Vehic. Tech. ( `18)."},{"volume-title":"SAE Technical Paper. (03","year":"2017","author":"Ganesan Arun","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"e_1_3_2_1_11_1","unstructured":"Hyunsung Lee Seong Hoon Jeong and Huy Kang Kim. 2017. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame. In PST (Privacy Security and Trust). (accepted).  Hyunsung Lee Seong Hoon Jeong and Huy Kang Kim. 2017. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame. In PST (Privacy Security and Trust). (accepted)."},{"key":"e_1_3_2_1_12_1","unstructured":"Jun Li. 2016. Deep Learning on CAN Bus. (2016). https:\/\/youtu.be\/1QSo5sOfXtI  Jun Li. 2016. Deep Learning on CAN Bus. (2016). https:\/\/youtu.be\/1QSo5sOfXtI"},{"key":"e_1_3_2_1_13_1","volume-title":"Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning. IEEE Access","volume":"6","author":"George","year":"2018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"e_1_3_2_1_15_1","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller Charlie","year":"2013","journal-title":"Def Con"},{"key":"e_1_3_2_1_16_1","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller Charlie","year":"2015","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Michael M\u00fcter and others. 2010. A structured approach to anomaly detection for in-vehicle networks. In IAS. IEEE.  Michael M\u00fcter and others. 2010. A structured approach to anomaly detection for in-vehicle networks. In IAS. IEEE.","DOI":"10.1109\/ISIAS.2010.5604050"},{"volume-title":"Proc. IEEE CAVS . (to appear).","author":"Brent","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Nature","volume":"323","author":"David","year":"1986"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Hyun Min Song Ha Rang Kim and Huy Kang Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In ICOIN. IEEE.  Hyun Min Song Ha Rang Kim and Huy Kang Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In ICOIN. IEEE.","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"e_1_3_2_1_22_1","unstructured":"Jean-Christophe Testud. 2017. Detecting ICS Attacks Through Process Variable Analysis. (2017). https:\/\/youtu.be\/b4lut5uWs2w  Jean-Christophe Testud. 2017. Detecting ICS Attacks Through Process Variable Analysis. (2017). https:\/\/youtu.be\/b4lut5uWs2w"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Zachariah Tyree Robert A Bridges Frank L Combs and Michael R Moore. 2018. Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection. In IEEE CAVS . (to appear) arXiv:1808.10840.  Zachariah Tyree Robert A Bridges Frank L Combs and Michael R Moore. 2018. Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection. In IEEE CAVS . (to appear) arXiv:1808.10840.","DOI":"10.1109\/VTCFall.2018.8690644"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00061"},{"key":"e_1_3_2_1_25_1","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"Woo Samuel","year":"2015","journal-title":"Tran. Intel. Trans. Sys."}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Richardson Texas USA","acronym":"CODASPY '19"},"container-title":["Proceedings of the ACM Workshop on Automotive Cybersecurity"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309171.3309180","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309171.3309180","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309171.3309180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:22Z","timestamp":1750268962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309171.3309180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":25,"alternative-id":["10.1145\/3309171.3309180","10.1145\/3309171"],"URL":"https:\/\/doi.org\/10.1145\/3309171.3309180","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}