{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:25:12Z","timestamp":1775838312575,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T00:00:00Z","timestamp":1570492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,8]]},"DOI":"10.1145\/3359999.3360496","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"1-8","source":"Crossref","is-referenced-by-count":29,"title":["Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus"],"prefix":"10.1145","author":[{"given":"Harsha Kumara","family":"Kalutarage","sequence":"first","affiliation":[{"name":"Robert Gordon University, United Kingdom"}]},{"given":"M. Omar","family":"Al-Kadri","sequence":"additional","affiliation":[{"name":"Robert Gordon University"}]},{"given":"Madeline","family":"Cheah","sequence":"additional","affiliation":[{"name":"HORIBA-MIRA"}]},{"given":"Garikayi","family":"Madzudzo","sequence":"additional","affiliation":[{"name":"HORIBA-MIRA"}]}],"member":"320","published-online":{"date-parts":[[2019,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Shaikh S. Haas O. Ruddle\u00a0A Cheah M.2017. Towards a systematic security evaluation of the automotive Bluetooth interface. (2017) 8\u201318.  Shaikh S. Haas O. Ruddle\u00a0A Cheah M.2017. Towards a systematic security evaluation of the automotive Bluetooth interface. (2017) 8\u201318.","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"e_1_3_2_1_2_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium, Vol.\u00a0August. The USENIX Association","author":"Checkoway Stephen","year":"2011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1006\/csla.1999.0128"},{"key":"e_1_3_2_1_4_1","unstructured":"Tsvika Dagan and Avishai Wool. 2016. Parrot a software-only anti-spoofing defense system for the CAN bus. ESCAR EUROPE (2016).  Tsvika Dagan and Avishai Wool. 2016. Parrot a software-only anti-spoofing defense system for the CAN bus. ESCAR EUROPE (2016)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65172-9_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"e_1_3_2_1_7_1","unstructured":"Bryans J. Shaikh S.A. Wooderson\u00a0P Fowler D.S.2018. Fuzz Testing for Automotive Cyber-Security. (2018) 239\u2013246.  Bryans J. Shaikh S.A. Wooderson\u00a0P Fowler D.S.2018. Fuzz Testing for Automotive Cyber-Security. (2018) 239\u2013246."},{"key":"e_1_3_2_1_8_1","unstructured":"John Greenough. 2015. Connecting cars to the internet has created a massive new business opportunity. https:\/\/www.businessinsider.com.au\/connected-car-market-forecast-report-2015-5. Accessed: 2019-06-02.  John Greenough. 2015. Connecting cars to the internet has created a massive new business opportunity. https:\/\/www.businessinsider.com.au\/connected-car-market-forecast-report-2015-5. Accessed: 2019-06-02."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_11_1","unstructured":"Dan Jurafsky and James\u00a0H Martin. 2014. Speech and language processing. Vol.\u00a03. Pearson London.  Dan Jurafsky and James\u00a0H Martin. 2014. Speech and language processing. Vol.\u00a03. Pearson London."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwy075"},{"key":"e_1_3_2_1_13_1","unstructured":"Harsha\u00a0K Kalutarage. 2013. Effective monitoring of slow suspicious activities on computer networks.Ph.D. Dissertation. Coventry University.  Harsha\u00a0K Kalutarage. 2013. Effective monitoring of slow suspicious activities on computer networks.Ph.D. Dissertation. Coventry University."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Slava Katz. 1987. Estimation of probabilities from sparse data for the language model component of a speech recognizer. IEEE transactions on acoustics speech and signal processing 35 3(1987) 400\u2013401.  Slava Katz. 1987. Estimation of probabilities from sparse data for the language model component of a speech recognizer. IEEE transactions on acoustics speech and signal processing 35 3(1987) 400\u2013401.","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"e_1_3_2_1_20_1","unstructured":"Sean\u00a0P Meyn and Richard\u00a0L Tweedie. 2012. Markov chains and stochastic stability. Springer Science & Business Media.  Sean\u00a0P Meyn and Richard\u00a0L Tweedie. 2012. Markov chains and stochastic stability. Springer Science & Business Media."},{"key":"e_1_3_2_1_21_1","volume-title":"Black Hat USA 2015(2015)","author":"Miller Charlie","year":"2015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Bernard\u00a0W Silverman. 2018. Density estimation for statistics and data analysis. Routledge.  Bernard\u00a0W Silverman. 2018. Density estimation for statistics and data analysis. Routledge.","DOI":"10.1201\/9781315140919"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00069"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"W. Wu R. Li G. Xie J. An Y. Bai J. Zhou and K. Li. 2019. A Survey of Intrusion Detection for In-Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems (2019) 1\u201315. https:\/\/doi.org\/10.1109\/TITS.2019.2908074  W. Wu R. Li G. Xie J. An Y. Bai J. Zhou and K. Li. 2019. A Survey of Intrusion Detection for In-Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems (2019) 1\u201315. https:\/\/doi.org\/10.1109\/TITS.2019.2908074","DOI":"10.1109\/TITS.2019.2908074"}],"event":{"name":"CSCS '19: COMPUTER SCIENCE IN CARS SYMPOSIUM","location":"Kaiserslautern Germany","acronym":"CSCS '19"},"container-title":["ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359999.3360496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,8]]},"references-count":30,"alternative-id":["10.1145\/3359999.3360496","10.1145\/3359999"],"URL":"https:\/\/doi.org\/10.1145\/3359999.3360496","relation":{},"subject":[],"published":{"date-parts":[[2019,10,8]]}}}