{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T06:12:23Z","timestamp":1768025543758,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Electronic Components and Systems for European Leadership Joint Undertaking","award":["783119"],"award-info":[{"award-number":["783119"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360729","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Approaching the Automation of Cyber Security Testing of Connected Vehicles"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Marksteiner","sequence":"first","affiliation":[{"name":"AVL List GmbH, Graz, Austria"}]},{"given":"Zhendong","family":"Ma","sequence":"additional","affiliation":[{"name":"Bosch Engineering, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"International Organization for Standardization and Society of Automotive Engineers. 2019. Road Vehicles -- Cybersecurity Engineering.  International Organization for Standardization and Society of Automotive Engineers. 2019. Road Vehicles -- Cybersecurity Engineering."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_3_1","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA.  Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA."},{"key":"e_1_3_2_1_5_1","first-page":"800","article-title":"Guide to Using Vulnerability Naming Schemes (Revision 1)","author":"Waltermire David","year":"2011","journal-title":"SP"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","location":"Munich Germany","acronym":"CECC 2019","sponsor":["University of Maribor"]},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":4,"alternative-id":["10.1145\/3360664.3360729","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360729","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}