{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:58:54Z","timestamp":1766138334788,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587861","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"218-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Comparative Evaluation of Anomaly-Based Controller Area Network IDS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2790-948X","authenticated-orcid":false,"given":"Shaila","family":"Sharmin","sequence":"first","affiliation":[{"name":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4309-7477","authenticated-orcid":false,"given":"Hafizah","family":"Mansor","sequence":"additional","affiliation":[{"name":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7479-6303","authenticated-orcid":false,"given":"Andi Fitriah","family":"Abdul Kadir","sequence":"additional","affiliation":[{"name":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5522-5261","authenticated-orcid":false,"given":"Normaziah","family":"A. Aziz","sequence":"additional","affiliation":[{"name":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Paul Agbaje Afia Anjum Arkajyoti Mitra Gedare Bloom and Habeeb Olufowobi. 2022. A Framework for Consistent and Repeatable Controller Area Network IDS Evaluation.  Paul Agbaje Afia Anjum Arkajyoti Mitra Gedare Bloom and Habeeb Olufowobi. 2022. A Framework for Consistent and Repeatable Controller Area Network IDS Evaluation.","DOI":"10.14722\/autosec.2022.23031"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431233"},{"volume-title":"Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection","author":"Berger Ivo","key":"e_1_3_2_1_3_1","unstructured":"Ivo Berger , Roland Rieke , Maxim Kolomeets , Andrey Chechulin , and Igor Kotenko . 2019. Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection . In Computer Security, Sokratis\u00a0K. Katsikas, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Ant\u00f3n, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis (Eds.). Springer International Publishing , Cham , 85\u2013101. Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, and Igor Kotenko. 2019. Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. In Computer Security, Sokratis\u00a0K. Katsikas, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Ant\u00f3n, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis (Eds.). Springer International Publishing, Cham, 85\u2013101."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23013"},{"key":"e_1_3_2_1_5_1","unstructured":"Robert\u00a0N. Charette. 2021. How Software Is Eating the Car. https:\/\/spectrum.ieee.org\/software-eating-car Section: Transportation.  Robert\u00a0N. Charette. 2021. How Software Is Eating the Car. https:\/\/spectrum.ieee.org\/software-eating-car Section: Transportation."},{"volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces(SEC\u201911)","author":"Checkoway Stephen","key":"e_1_3_2_1_6_1","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , and Tadayoshi Kohno . 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces(SEC\u201911) . USENIX Association , USA , 6. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces(SEC\u201911). USENIX Association, USA, 6."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-021-00244-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241165"},{"key":"e_1_3_2_1_10_1","unstructured":"Teresa Costa\u00a0Ca\u00f1ones. 2021. Benchmarking framework for Intrusion Detection Systems in Controller Area Networks. Ph.\u00a0D. Dissertation. Politecnico di Milano and Universitat Politecnica de Catalunya. https:\/\/www.politesi.polimi.it\/handle\/10589\/176269  Teresa Costa\u00a0Ca\u00f1ones. 2021. Benchmarking framework for Intrusion Detection Systems in Controller Area Networks. Ph.\u00a0D. Dissertation. Politecnico di Milano and Universitat Politecnica de Catalunya. https:\/\/www.politesi.polimi.it\/handle\/10589\/176269"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE45908.2019.8965028"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848106"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071072"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"e_1_3_2_1_17_1","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. In Black Hat USA. Las Vegas.  Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. In Black Hat USA. Las Vegas."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2010.16061"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"e_1_3_2_1_22_1","unstructured":"Dario Stabili Francesco Pollicino and Alessio Rota. 2021. A benchmark framework for CAN IDS.  Dario Stabili Francesco Pollicino and Alessio Rota. 2021. A benchmark framework for CAN IDS."},{"volume-title":"Comparative Study of\u00a0Ensemble Learning Techniques for\u00a0Fuzzy Attack Detection in\u00a0In-Vehicle Networks","author":"Swessi Dorsaf","key":"e_1_3_2_1_23_1","unstructured":"Dorsaf Swessi and Hanen Idoudi . 2022. Comparative Study of\u00a0Ensemble Learning Techniques for\u00a0Fuzzy Attack Detection in\u00a0In-Vehicle Networks . In Advanced Information Networking and Applications, Leonard Barolli, Farookh Hussain, and Tomoya Enokido (Eds.). Springer International Publishing , Cham , 598\u2013610. Dorsaf Swessi and Hanen Idoudi. 2022. Comparative Study of\u00a0Ensemble Learning Techniques for\u00a0Fuzzy Attack Detection in\u00a0In-Vehicle Networks. In Advanced Information Networking and Applications, Leonard Barolli, Farookh Hussain, and Tomoya Enokido (Eds.). Springer International Publishing, Cham, 598\u2013610."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145054"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273946.3273950"},{"key":"e_1_3_2_1_26_1","unstructured":"Miki\u00a0E. Verma Michael\u00a0D. Iannacone Robert\u00a0A. Bridges Samuel\u00a0C. Hollifield Pablo Moriano Bill Kay and Frank\u00a0L. Combs. 2020. Addressing the Lack of Comparability & Testing in CAN Instrusion Detection Research: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset. (2020). http:\/\/arxiv.org\/abs\/2012.14600 arXiv:2012.14600.  Miki\u00a0E. Verma Michael\u00a0D. Iannacone Robert\u00a0A. Bridges Samuel\u00a0C. Hollifield Pablo Moriano Bill Kay and Frank\u00a0L. Combs. 2020. Addressing the Lack of Comparability & Testing in CAN Instrusion Detection Research: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset. (2020). http:\/\/arxiv.org\/abs\/2012.14600 arXiv:2012.14600."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309179"}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587861","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":27,"alternative-id":["10.1145\/3587828.3587861","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587861","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}