{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:10Z","timestamp":1775228710988,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0835"],"award-info":[{"award-number":["16KIS0835"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3465755","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["In-vehicle detection of targeted CAN bus attacks"],"prefix":"10.1145","author":[{"given":"Florian","family":"Fenzl","sequence":"first","affiliation":[{"name":"Fraunhofer SIT, Germany"}]},{"given":"Roland","family":"Rieke","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Germany"}]},{"given":"Andreas","family":"Dominik","sequence":"additional","affiliation":[{"name":"THM University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of 12th Annual Canadian Information Technology Security Symposium. 109\u2013122","author":"Bridges M","year":"2000","unstructured":"Susan\u00a0M Bridges, Rayford\u00a0B Vaughn, 2000. Fuzzy data mining and genetic algorithms applied to intrusion detection. In Proceedings of 12th Annual Canadian Information Technology Security Symposium. 109\u2013122."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32258-8_58"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the AAAI.","author":"Crosbie M","year":"1995","unstructured":"M Crosbie and E Spafford. 1995. Applying Genetic Algorithms to Intrusion Detection. In Proceedings of the AAAI."},{"key":"e_1_3_2_1_6_1","volume-title":"Understanding and using the controller area network communication protocol: theory and practice","author":"Di\u00a0Natale Marco","unstructured":"Marco Di\u00a0Natale, Haibo Zeng, Paolo Giusto, and Arkadeb Ghosal. 2012. Understanding and using the controller area network communication protocol: theory and practice. Springer Science & Business Media."},{"key":"e_1_3_2_1_8_1","unstructured":"Bob Fisch and Jeroen Meijer. 2016\u2013. CanZE: Take a closer look at your ZOE. https:\/\/github.com\/fesch\/CanZE"},{"key":"e_1_3_2_1_9_1","volume-title":"Marc-Andr\u00e9 Gardner, Marc Parizeau, and Christian Gagn\u00e9.","author":"Fortin F\u00e9lix-Antoine","year":"2012","unstructured":"F\u00e9lix-Antoine Fortin, Fran\u00e7ois-Michel De Rainville, Marc-Andr\u00e9 Gardner, Marc Parizeau, and Christian Gagn\u00e9. 2012. DEAP: Evolutionary Algorithms Made Easy. Journal of Machine Learning Research 13 (jul 2012), 2171\u20132175."},{"key":"e_1_3_2_1_10_1","first-page":"218","article-title":"Specializing unsupervised anomaly detection systems using genetic programming. (26 Feb 2019)","volume":"10","author":"Gay S\u00e9bastien","year":"2019","unstructured":"S\u00e9bastien Gay, Laurent Sartran, and Jean-Philippe Vasseur. 2019. Specializing unsupervised anomaly detection systems using genetic programming. (26 Feb 2019). , US Patent 10,218,729.","journal-title":"US Patent"},{"key":"e_1_3_2_1_11_1","unstructured":"Anup Goyal and Chetan Kumar. 2008. GA-NIDS: a genetic algorithm based network intrusion detection system. Northwestern university(2008)."},{"key":"e_1_3_2_1_12_1","unstructured":"Hacking and Countermeasure Research Lab (HCRL). 2018. Car-Hacking Dataset for the intrusion detection. http:\/\/ocslab.hksecurity.net\/Datasets\/CAN-intrusion-dataset. [Online; accessed 28-Jun-2018]."},{"key":"e_1_3_2_1_13_1","volume-title":"Evolutionary Algorithms: Overview, Methods and Operators. GEATbx version 3(2004).","author":"Hartmut Pohlheim","year":"2004","unstructured":"Pohlheim Hartmut. 2004. Evolutionary Algorithms: Overview, Methods and Operators. GEATbx version 3(2004)."},{"key":"e_1_3_2_1_14_1","unstructured":"Tobias Islinger Yasuhiro Mori Jennifer Neum\u00fcller Martin Prisching and Robert Schmidt. 2017. Autosar SecOC for CAN FD. https:\/\/can-newsletter.org\/engineering\/engineering-miscellaneous\/170306_autosar-secoc-for-can-fd_denso"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_16_1","unstructured":"John\u00a0R Koza. 1997. Genetic programming. (1997)."},{"key":"e_1_3_2_1_17_1","volume-title":"Detecting new forms of network intrusion using genetic programming. Computational intelligence 20, 3","author":"Lu Wei","year":"2004","unstructured":"Wei Lu and Issa Traore. 2004. Detecting new forms of network intrusion using genetic programming. Computational intelligence 20, 3 (2004), 475\u2013494."},{"key":"e_1_3_2_1_18_1","first-page":"233","article-title":"Genetic algorithms in intrusion detection systems: A survey","volume":"5","author":"Majeed Parry\u00a0Gowher","year":"2014","unstructured":"Parry\u00a0Gowher Majeed and Santosh Kumar. 2014. Genetic algorithms in intrusion detection systems: A survey. International Journal of Innovation and Applied Studies 5, 3(2014), 233.","journal-title":"International Journal of Innovation and Applied Studies"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"e_1_3_2_1_21_1","volume-title":"Genetic algorithms, tournament selection, and the effects of noise. Complex systems 9, 3","author":"Miller L","year":"1995","unstructured":"Brad\u00a0L Miller, David\u00a0E Goldberg, 1995. Genetic algorithms, tournament selection, and the effects of noise. Complex systems 9, 3 (1995), 193\u2013212."},{"key":"e_1_3_2_1_22_1","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller Charlie","year":"2013","unstructured":"Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. Def Con 21(2013), 260\u2013264.","journal-title":"Def Con"},{"key":"e_1_3_2_1_23_1","volume-title":"Black Hat USA 2015(2015)","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(2015), 91."},{"key":"e_1_3_2_1_24_1","volume-title":"Strongly typed genetic programming. Evolutionary computation 3, 2","author":"Montana J","year":"1995","unstructured":"David\u00a0J Montana. 1995. Strongly typed genetic programming. Evolutionary computation 3, 2 (1995), 199\u2013230."},{"key":"e_1_3_2_1_25_1","unstructured":"Controller\u00a0Area Network. 1991. Specification\u2014Version 2.0. Bosch GmbH (1991)."},{"key":"e_1_3_2_1_26_1","unstructured":"Sen Nie Ling Liu and Yuefeng Du. 2017. Free-fall: hacking tesla from wireless to CAN bus. Briefing Black Hat USA(2017) 1\u201316."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20407-4_18"},{"key":"e_1_3_2_1_28_1","volume-title":"Extending AUTOSAR\u2019s Counter-Based Solution for Freshness of Authenticated Messages in Vehicles. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). 1\u2013109","author":"Rosenstatter T.","unstructured":"T. Rosenstatter, C. Sandberg, and T. Olovsson. 2019. Extending AUTOSAR\u2019s Counter-Based Solution for Freshness of Authenticated Messages in Vehicles. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). 1\u2013109."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"e_1_3_2_1_32_1","volume-title":"SAFECOMP 2013 - Workshop CARS of the 32nd International Conference on Computer Safety, Reliability and Security, Matthieu ROY (Ed.).","author":"Studnia Ivan","year":"2013","unstructured":"Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Ka\u00e2niche, and Youssef Laarouchi. 2013. Security of embedded automotive networks: state of the art and a research proposal. In SAFECOMP 2013 - Workshop CARS of the 32nd International Conference on Computer Safety, Reliability and Security, Matthieu ROY (Ed.)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145054"},{"key":"e_1_3_2_1_35_1","volume-title":"ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide). arXiv preprint arXiv:2012.14600(2020).","author":"Verma E","year":"2020","unstructured":"Miki\u00a0E Verma, Michael\u00a0D Iannacone, Robert\u00a0A Bridges, Samuel\u00a0C Hollifield, Bill Kay, and Frank\u00a0L Combs. 2020. ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide). arXiv preprint arXiv:2012.14600(2020)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP50117.2020.00070"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3465755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3465755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:29Z","timestamp":1750191449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3465755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":34,"alternative-id":["10.1145\/3465481.3465755","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3465755","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}