{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:36:44Z","timestamp":1773329804694,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T00:00:00Z","timestamp":1570492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,8]]},"DOI":"10.1145\/3359999.3360494","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["AVES \u2013 Automated Vehicle Safety and Security Analysis Framework"],"prefix":"10.1145","author":[{"given":"Giedre","family":"Sabaliauskaite","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Lin Shen","family":"Liew","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design"}]},{"given":"Fengjun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design"}]}],"member":"320","published-online":{"date-parts":[[2019,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2017.8263141"},{"key":"e_1_3_2_1_2_1","volume-title":"Applications and Technology Conference (LISAT). 1\u20136.","author":"Axelrod Warren","year":"2017"},{"key":"e_1_3_2_1_3_1","unstructured":"Louis Cohen. 1995. Quality Function Deployment: How to Make QFD Work for You. Addison-Wesley.  Louis Cohen. 1995. Quality Function Deployment: How to Make QFD Work for You. Addison-Wesley."},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity","volume":"12","author":"Eiza Mahmoud\u00a0Hashem","year":"2017","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"e_1_3_2_1_5_1","unstructured":"ISO 20077 2017. Road Vehicles \u2013 Extended vehicle (ExVe) Methodology (2 ed.). Standard. International Organization for Standardization.  ISO 20077 2017. Road Vehicles \u2013 Extended vehicle (ExVe) Methodology (2 ed.). Standard. International Organization for Standardization."},{"key":"e_1_3_2_1_6_1","unstructured":"ISO 26262 2018. Road Vehicles \u2013 Functional Safety(2 ed.). Standard. International Organization for Standardization.  ISO 26262 2018. Road Vehicles \u2013 Functional Safety(2 ed.). Standard. International Organization for Standardization."},{"key":"e_1_3_2_1_7_1","unstructured":"ISO\/PAS 21448 2019. Road Vehicles - Safety of Intended Functionality (1 ed.). Standard. International Organization for Standardization.  ISO\/PAS 21448 2019. Road Vehicles - Safety of Intended Functionality (1 ed.). Standard. International Organization for Standardization."},{"key":"e_1_3_2_1_8_1","unstructured":"ISO\/SAE AWI 21434 Under development. ISO\/SAE AWI 21434 Road Vehicles \u2013 Cybersecurity engineering (1 ed.). Standard. International Organization of Standardization.  ISO\/SAE AWI 21434 Under development. ISO\/SAE AWI 21434 Road Vehicles \u2013 Cybersecurity engineering (1 ed.). Standard. International Organization of Standardization."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"I. Ivanov C. Maple T. Watson and S. Lee. 2018. Cyber security standards and issues in V2X communications for Internet of Vehicles. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. 1\u20136.  I. Ivanov C. Maple T. Watson and S. Lee. 2018. Cyber security standards and issues in V2X communications for Internet of Vehicles. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. 1\u20136.","DOI":"10.1049\/cp.2018.0046"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Nancy\u00a0G. Leveson. 2012. Engineering a Safer World: Systems Thinking Applied to Safety. The MIT Press.  Nancy\u00a0G. Leveson. 2012. Engineering a Safer World: Systems Thinking Applied to Safety. The MIT Press.","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"e_1_3_2_1_11_1","first-page":"2","article-title":"The Architectural Implications of Autonomous Driving","volume":"53","author":"Lin Shih-Chieh","year":"2018","journal-title":"Constraints and Acceleration. SIGPLAN Not."},{"key":"e_1_3_2_1_12_1","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit Jonathan","year":"2015","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Integrating Autonomous Vehicle Safety and Security Analysis Using STPA Method and the Six-Step Model","volume":"11","author":"Sabaliauskaite Giedre","year":"2018","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_2_1_14_1","unstructured":"SAE J3016 2016. SAE J3016: Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Standard. SAE International.  SAE J3016 2016. SAE J3016: Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Standard. SAE International."},{"key":"e_1_3_2_1_15_1","unstructured":"SAE J3061 2016. SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (1 ed.). Standard. SAE International.  SAE J3061 2016. SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (1 ed.). Standard. SAE International."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"TR 68. Autonomous vehicles","author":"TR","year":"2019","journal-title":"Parts"}],"event":{"name":"CSCS '19: COMPUTER SCIENCE IN CARS SYMPOSIUM","location":"Kaiserslautern Germany","acronym":"CSCS '19"},"container-title":["ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359999.3360494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,8]]},"references-count":16,"alternative-id":["10.1145\/3359999.3360494","10.1145\/3359999"],"URL":"https:\/\/doi.org\/10.1145\/3359999.3360494","relation":{},"subject":[],"published":{"date-parts":[[2019,10,8]]}}}