{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589501,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723200","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"162-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Connected Vehicles: An Evaluation Framework for CAN bus-enabled In-vehicle Communications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2703-0213","authenticated-orcid":false,"given":"SK Hafizul","family":"Islam","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6468-3541","authenticated-orcid":false,"given":"Somesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6392-8980","authenticated-orcid":false,"given":"Vemana Joshua","family":"Immanuel","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5831-950X","authenticated-orcid":false,"given":"Purvansh","family":"Sonthalia","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9854-5890","authenticated-orcid":false,"given":"Shukla","family":"Mondal","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-0715","authenticated-orcid":false,"given":"Arup","family":"Pal","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, IIT(ISM) Dhanbad, Dhanbad, Jharkhand, India"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Bifta\u00a0Sama Bari Kumar Yelamarthi and Sheikh Ghafoor. 2023. Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study. Sensors 23 7 (2023) 3610.","DOI":"10.3390\/s23073610"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Lotfi Ben\u00a0Othmane Lalitha Dhulipala Moataz Abdelkhalek Nicholas Multari and Manimaran Govindarasu. 2020. On the performance of detecting injection of fabricated messages into the CAN bus. IEEE Transactions on Dependable and Secure Computing 19 1 (2020) 468\u2013481.","DOI":"10.1109\/TDSC.2020.2990192"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Zixiang Bi Guoai Xu Guosheng Xu Miaoqing Tian Ruobing Jiang Sutao Zhang et\u00a0al. 2022. Intrusion detection method for in-vehicle can bus based on message and time transfer matrix. Security and Communication Networks 2022 (2022).","DOI":"10.1155\/2022\/2554280"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Defeng Ding Yehua Wei Can Cheng and Jing Long. 2023. Intrusion Detection for In-Vehicle CAN Bus Based on Lightweight Neural Network. Journal of Circuits Systems and Computers 32 07 (2023) 2350110.","DOI":"10.1142\/S0218126623501104"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Chen Dong Hao Wu and Qingyuan Li. 2023. Multiple Observation HMM-Based CAN Bus Intrusion Detection System for In-Vehicle Network. IEEE Access 11 (2023) 35639\u201335648.","DOI":"10.1109\/ACCESS.2023.3265018"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Markus Hanselmann Thilo Strauss Katharina Dormann and Holger Ulmer. 2020. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data. Ieee Access 8 (2020) 58194\u201358205.","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Siti-Farhana Lokman Abu\u00a0Talib Othman and Muhammad-Husaini Abu-Bakar. 2019. Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP Journal on Wireless Communications and Networking 2019 (2019) 1\u201317.","DOI":"10.1186\/s13638-019-1484-3"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Alexey Natekin and Alois Knoll. 2013. Gradient boosting machines a tutorial. Frontiers in neurorobotics 7 (2013) 21.","DOI":"10.3389\/fnbot.2013.00021"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380102"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Pengcheng Wei Bo Wang Xiaojun Dai Li Li and Fangcheng He. 2023. A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder. Digital Communications and Networks 9 1 (2023) 14\u201321.","DOI":"10.1016\/j.dcan.2022.04.021"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Zhaozhao Xu Derong Shen Tiezheng Nie and Yue Kou. 2020. A hybrid sampling algorithm combining M-SMOTE and ENN based on Random forest for medical imbalanced data. Journal of Biomedical Informatics 107 (2020) 103465. 10.1016\/j.jbi.2020.103465","DOI":"10.1016\/j.jbi.2020.103465"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Xinmeng Zhang Chao Yan Cheng Gao Bradley\u00a0A Malin and You Chen. 2020. Predicting missing values in medical data via XGBoost regression. Journal of healthcare informatics research 4 (2020) 383\u2013394.","DOI":"10.1007\/s41666-020-00077-1"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":14,"alternative-id":["10.1145\/3723178.3723200","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723200","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}