{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:48:14Z","timestamp":1775666894626,"version":"3.50.1"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Short Term Research Grant","award":["str17001"],"award-info":[{"award-number":["str17001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1484-3","type":"journal-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:03:00Z","timestamp":1563541380000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":229,"title":["Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9440-713X","authenticated-orcid":false,"given":"Siti-Farhana","family":"Lokman","sequence":"first","affiliation":[]},{"given":"Abu Talib","family":"Othman","sequence":"additional","affiliation":[]},{"given":"Muhammad-Husaini","family":"Abu-Bakar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"1484_CR1","first-page":"94","volume-title":"Black Hat USA, 2014","author":"C Miller","year":"2014","unstructured":"C. Miller, C. Valasek, in Black Hat USA, 2014. A survey of remote automotive attack surfaces (2014), p. 94"},{"issue":"1","key":"1484_CR2","doi-asserted-by":"publisher","first-page":"074706","DOI":"10.1186\/1687-3963-2007-074706","volume":"2007","author":"M Wolf","year":"2007","unstructured":"M. Wolf, A. Weimerskirch, T. Wollinger, State of the art: Embedding security in vehicles. EURASIP J. Embed. Syst. 2007(1), 074706 (2007)","journal-title":"EURASIP J. Embed. Syst."},{"key":"1484_CR3","unstructured":"T. Nohet, H. Hanssont, L.L. Bello, in IEEE Symposium on Emerging Technologies and Factory Automation. Automotive Communications-past, Current and Future (Catania, 2005)"},{"key":"1484_CR4","first-page":"91","volume-title":"Black Hat USA, 2015","author":"C Miller","year":"2015","unstructured":"C. Miller, C. Valasek, in Black Hat USA, 2015. Remote exploitation of an unaltered passenger vehicle (2015), p. 91"},{"key":"1484_CR5","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"S. Al-Sultan, M.M. Al-Doori, A.H. Al-Bayatti, H. Zedan, A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 37, 380\u2013392 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"1484_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2009.5307471","volume":"47","author":"P Papadimitratos","year":"2009","unstructured":"P. Papadimitratos, A.L. Fortelle, K. Evenssen, R. Brignolo, S. Cosenza, Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 47(11), 84\u201395 (2009)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"1484_CR7","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"A. Humayed, J. Lin, F. Li, B. Luo, Cyber-Physical Systems Security\u2014A Survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"key":"1484_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"F. Sakiz, S. Sen, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33\u201350 (2017)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"1484_CR9","first-page":"546","volume":"16","author":"J Petit","year":"2015","unstructured":"J. Petit, S.E. Shladover, Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546\u2013556 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"1484_CR10","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/LCOMM.2013.102213.132056","volume":"18","author":"N Lyamin","year":"2014","unstructured":"N. Lyamin, A. Vinel, M. Jonsson, J. Loo, Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Commun. Lett. 18(1), 110\u2013113 (2014)","journal-title":"IEEE Commun. Lett."},{"key":"1484_CR11","doi-asserted-by":"crossref","unstructured":"H. Lee, S.H. Jeong, H.K. Kim, in 2017 15th Annual Conference on Privacy, Security and Trust (PST). OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame (Calgary, 2017), pp. 57\u20135709","DOI":"10.1109\/PST.2017.00017"},{"key":"1484_CR12","unstructured":"Carsten, P., Andel, T. R., Yampolskiy, M., & McDonald, J. T. In-vehicle networks: Attacks, vulnerabilities, and proposed solutions. In Proceedings of the 10th Annual Cyber and Information Security Research Conference. Oak Ridge. (p. 1). (2015)."},{"key":"1484_CR13","doi-asserted-by":"crossref","unstructured":"K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, in 2010 IEEE Symposium on Security and Privacy. Experimental security analysis of a modern automobile (Berkeley\/Oakland, 2010), pp. 447\u2013462","DOI":"10.1109\/SP.2010.34"},{"key":"1484_CR14","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2015.0295","volume-title":"A security-minded approach to vehicle automation, road infrastructure technology, and connectivity","author":"HA Boyes","year":"2015","unstructured":"H.A. Boyes, A.E.A. Luck, A security-minded approach to vehicle automation, road infrastructure technology, and connectivity (2015)"},{"issue":"2","key":"1484_CR15","first-page":"993","volume":"16","author":"S Woo","year":"2015","unstructured":"S. Woo, H.J. Jo, D.H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993\u20131006 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"1484_CR16","first-page":"22","volume":"6","author":"K Han","year":"2014","unstructured":"K. Han, A. Weimerskirch, K.G. Shin, Automotive cybersecurity for in-vehicle communication. IQT Q. 6(1), 22\u201325 (2014)","journal-title":"IQT Q."},{"key":"1484_CR17","unstructured":"O. Hartkopp, R.M. SCHILLING, in Escar Conference. Message authenticated can (Berlin, 2012)"},{"key":"1484_CR18","series-title":"Proc. 11th Int. Conf. Cryptology and Network Security, CANS, Darmstadt","volume-title":"Libra-can: a lightweight broadcast authentication protocol for controller area networks","author":"B Groza","year":"2012","unstructured":"B. Groza, S. Murvay, A. Van Herrewege, I. Verbauwhede, Libra-can: a lightweight broadcast authentication protocol for controller area networks Proc. 11th Int. Conf. Cryptology and Network Security, CANS, Darmstadt, 2012"},{"key":"1484_CR19","series-title":"Doctoral dissertation, Carnegie Mellon University","volume-title":"Low cost multicast network authentication for embedded control systems","author":"CJ Szilagyi","year":"2012","unstructured":"C.J. Szilagyi, Low cost multicast network authentication for embedded control systems Doctoral dissertation, Carnegie Mellon University (2012)"},{"key":"1484_CR20","doi-asserted-by":"crossref","unstructured":"D.K. Nilsson, U.E. Larson, E. Jonsson, in 2008 IEEE 68th Vehicular Technology Conference. Efficient in-vehicle delayed data authentication based on compound message authentication codes (Calgary, 2008), pp. 1\u20135","DOI":"10.1109\/VETECF.2008.259"},{"key":"1484_CR21","volume-title":"CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus","author":"A Van Herrewege","year":"2011","unstructured":"A. Van Herrewege, D. Singelee, I. Verbauwhede, in CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. ECRYPT Workshop on Lightweight Cryptography (Vol. 2011) (2011)"},{"key":"1484_CR22","unstructured":"K.T. Cho, K.G. Shin, in 25th {USENIX} Security Symposium ({USENIX} Security 16). Fingerprinting electronic control units for vehicle intrusion detection (Austin, 2016), pp. 911\u2013927"},{"key":"1484_CR23","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"International Conference on Computer Safety, Reliability, and Security Springer, Berlin, Heidelberg","author":"T Hoppe","year":"2008","unstructured":"T. Hoppe, S. Kiltz, J. Dittmann, in International Conference on Computer Safety, Reliability, and Security Springer, Berlin, Heidelberg. Security threats to automotive CAN networks\u2013practical examples and selected short-term countermeasures (2008), pp. 235\u2013248"},{"key":"1484_CR24","doi-asserted-by":"crossref","unstructured":"M. Marchetti, D. Stabili, A. Guido, M. Colajanni, in 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI). Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms (Bologna, 2016), pp. 1\u20136","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"1484_CR25","doi-asserted-by":"crossref","unstructured":"V. Verendel, D.K. Nilsson, U.E. Larson, E. Jonsson, in 2008 IEEE 68th Vehicular Technology Conference. An approach to using honeypots in in-vehicle networks (Calgary, 2008), pp. 1\u20135","DOI":"10.1109\/VETECF.2008.260"},{"key":"1484_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-28428-1","volume-title":"Embedded security in cars","author":"K Lemke","year":"2006","unstructured":"K. Lemke, C. Paar, M. Wolf, Embedded security in cars (Springer-Verlag, Berlin Heidelberg, 2006), pp. 3\u201312"},{"key":"1484_CR27","unstructured":"Arilou Cyber Security. (2016). [Online] \n                    https:\/\/www.nng.com\/arilou-cyber-security\/"},{"key":"1484_CR28","unstructured":"Argus Cyber Security. (2013). [Online] \n                    https:\/\/argus-sec.com\/"},{"key":"1484_CR29","unstructured":"J. Berg, J. Pommer, C. Jin, F. Malmin, J. Kristensson, A.B. Semcon Sweden, in 13th Embedded Security in Cars (ESCAR\u201915). Secure gateway-a concept for an in-vehicle IP network bridging the infotainment and the safety critical domains (Stuttgart, 2015)"},{"key":"1484_CR30","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/IVS.2008.4621263","volume-title":"Intelligent Vehicles Symposium, 2008 IEEE","author":"UE Larson","year":"2008","unstructured":"U.E. Larson, D.K. Nilsson, E. Jonsson, in Intelligent Vehicles Symposium, 2008 IEEE. An approach to specification-based attack detection for in-vehicle networks (2008), pp. 220\u2013225"},{"issue":"7","key":"1484_CR31","doi-asserted-by":"publisher","first-page":"552","DOI":"10.4304\/jnw.4.7.552-564","volume":"4","author":"DK Nilsson","year":"2009","unstructured":"D.K. Nilsson, U. Larson, A defense-in-depth approach to securing the wireless vehicle infrastructure. JNW 4(7), 552\u2013564 (2009)","journal-title":"JNW"},{"key":"1484_CR32","doi-asserted-by":"crossref","unstructured":"P. Kleberger, T. Olovsson, E. Jonsson, in 2011 IEEE Intelligent Vehicles Symposium (IV). Security aspects of the in-vehicle network in the connected car (Baden-Baden, 2011), pp. 528\u2013533","DOI":"10.1109\/IVS.2011.5940525"},{"key":"1484_CR33","doi-asserted-by":"crossref","unstructured":"I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Ka\u00e2niche, Y. Laarouchi, in 2013 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). Survey on security threats and protection mechanisms in embedded automotive networks (Budapest, 2013), pp. 1\u201312","DOI":"10.1109\/DSNW.2013.6615528"},{"issue":"4","key":"1484_CR34","doi-asserted-by":"publisher","first-page":"supl27","DOI":"10.1109\/MC.2002.1012428","volume":"35","author":"RA Kemmerer","year":"2002","unstructured":"R.A. Kemmerer, G. Vigna, Intrusion detection: a brief history and overview. Computer 35(4), supl27\u2013supl30 (2002)","journal-title":"Computer"},{"key":"1484_CR35","unstructured":"J.R. Vacca, Computer and information security handbook. Newnes (Amsterdam, 2012), pp. 47\u201360"},{"issue":"6","key":"1484_CR36","first-page":"226","volume":"4","author":"T Hoppe","year":"2009","unstructured":"T. Hoppe, S. Kiltz, J. Dittmann, Applying intrusion detection to automotive it-early insights and remaining challenges. J. Inform. Assur. Secur. 4(6), 226\u2013235 (2009)","journal-title":"J. Inform. Assur. Secur."},{"key":"1484_CR37","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"B.B. Zarpel\u00e3o, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"1484_CR38","doi-asserted-by":"crossref","unstructured":"I. Studnia, E. Alata, V. Nicomette, M. Ka\u00e2niche, Y. Laarouchi, A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1) (2018) United Kingdom","DOI":"10.1504\/IJES.2018.089430"},{"key":"1484_CR39","unstructured":"L. Apvrille, R. El Khayari, O. Henniger, Y. Roudier, H. Schweppe, H. Seudi\u00e9, B. Weyl, M. Wolf, Secure automotive on-board electronics network architecture FISITA World Automotive Congress, Budapest,8 2010"},{"key":"1484_CR40","doi-asserted-by":"crossref","unstructured":"T. B\u00e9csi, S. Aradi, P. G\u00e1sp\u00e1r, in 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS). Security issues and vulnerabilities in connected car systems (Budapest, 2015), pp. 477\u2013482","DOI":"10.1109\/MTITS.2015.7223297"},{"key":"1484_CR41","doi-asserted-by":"crossref","unstructured":"A. Taylor, N. Japkowicz, S. Leblanc, in 2015 World Congress on Industrial Control Systems Security (WCICSS). Frequency-based anomaly detection for the automotive CAN bus (London, 2015), pp. 45\u201349","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"1484_CR42","unstructured":"S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, et al., Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium (2011)"},{"key":"1484_CR43","doi-asserted-by":"crossref","unstructured":"A. Taylor, S. Leblanc, N. Japkowicz, in 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). Anomaly detection in automobile control network data with long short-term memory networks (Montreal, 2016), pp. 130\u2013139","DOI":"10.1109\/DSAA.2016.20"},{"key":"1484_CR44","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/AINA.2015.274","volume-title":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications","author":"H Lee","year":"2015","unstructured":"H. Lee, K. Choi, K. Chung, J. Kim, K. Yim, in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications. Fuzzing can packets into automobiles (2015), pp. 817\u2013821"},{"key":"1484_CR45","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"C. Miller, C. Valasek, Adventures in automotive networks and control units. Def. Con. 21, 260\u2013264 (2013) 54. Miller, C., & Valasek, C. Adventures in automotive networks and control units. DEF CON, 21, 260\u2013264. (2013)","journal-title":"Def. Con."},{"key":"1484_CR46","doi-asserted-by":"crossref","unstructured":"R.I. Davis, S. Kollmann, V. Pollex, F. Slomka, in 2011 23rd Euromicro Conference on Real-Time Systems. Controller area network (can) schedulability analysis with fifo queues (Porto, 2011), pp. 45\u201356","DOI":"10.1109\/ECRTS.2011.13"},{"key":"1484_CR47","doi-asserted-by":"crossref","unstructured":"D.A. Khan, R.J. Bril, N. Navet, in 2010 IEEE International Workshop on Factory Communication Systems Proceedings. Integrating hardware limitations in CAN schedulability analysis (Nancy, 2010), pp. 207\u2013210","DOI":"10.1109\/WFCS.2010.5548604"},{"key":"1484_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0314-2","volume-title":"Understanding and using the controller area network communication protocol: theory and practice","author":"M Di Natale","year":"2012","unstructured":"M. Di Natale, H. Zeng, P. Giusto, A. Ghosal, Understanding and using the controller area network communication protocol: theory and practice (Springer Science & Business Media, NY, 2012)"},{"key":"1484_CR49","first-page":"1","volume-title":"Proc. Int. Conf. Embedded Security Cars","author":"L Pike","year":"2015","unstructured":"L. Pike, J. Sharp, M. Tullsen, P.C. Hickey, J. Bielman, in Proc. Int. Conf. Embedded Security Cars. Securing the automobile: A comprehensive approach (2015), pp. 1\u201314"},{"issue":"1","key":"1484_CR50","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maci\u00e1-Fern\u00e1ndez, E. V\u00e1zquez, Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"issue":"4","key":"1484_CR51","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"R. Mitchell, I.R. Chen, A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"1484_CR52","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"I. Butun, S.D. Morgera, R. Sankar, A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266\u2013282 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1484_CR53","volume-title":"9th European Congress on Embedded Real Time Software and Systems","author":"M Weber","year":"2018","unstructured":"M. Weber, S. Klug, E. Sax, B. Zimmer, in 9th European Congress on Embedded Real Time Software and Systems. Embedded hybrid anomaly detection for automotive CAN communication (2018)"},{"key":"1484_CR54","doi-asserted-by":"publisher","first-page":"9091","DOI":"10.1109\/ACCESS.2018.2799210","volume":"6","author":"C Wang","year":"2018","unstructured":"C. Wang, Z. Zhao, L. Gong, L. Zhu, Z. Liu, X. Cheng, A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6, 9091\u20139098 (2018)","journal-title":"IEEE Access"},{"key":"1484_CR55","doi-asserted-by":"crossref","unstructured":"M. M\u00fcter, N. Asaj, in 2011 IEEE Intelligent Vehicles Symposium (IV). Entropy-based anomaly detection for in-vehicle networks (Baden-Baden, 2011), pp. 1110\u20131115","DOI":"10.1109\/IVS.2011.5940552"},{"key":"1484_CR56","doi-asserted-by":"crossref","unstructured":"Hoppe, T., Kiltz, S., & Dittmann, J. Adaptive dynamic reaction to automotive it security incidents using multimedia car environment. In 2008 The Fourth International Conference on Information Assurance and Security, Naples. (pp. 295-298). (2008).","DOI":"10.1109\/IAS.2008.45"},{"key":"1484_CR57","doi-asserted-by":"crossref","unstructured":"Song, H. M., Kim, H. R., & Kim, H. K. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In 2016 international conference on information networking (ICOIN), Kota Kinabalu. (pp. 63-68). (2016).","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"1484_CR58","volume-title":"2012 National Conference on Information Technology and Computer Science","author":"C Ling","year":"2012","unstructured":"C. Ling, D. Feng, in 2012 National Conference on Information Technology and Computer Science. An algorithm for detection of malicious messages on CAN buses (Atlantis Press, Paris, 2012)"},{"key":"1484_CR59","doi-asserted-by":"crossref","unstructured":"P. Carsten, T.R. Andel, M. Yampolskiy, J.T. McDonald, in Proceedings of the 10th Annual Cyber and Information Security Research Conference. In-vehicle networks: Attacks, vulnerabilities, and proposed solutions (Oak Ridge, 2015), p. 1","DOI":"10.1145\/2746266.2746267"},{"key":"1484_CR60","doi-asserted-by":"crossref","unstructured":"M. Gmiden, M.H. Gmiden, H. Trabelsi, in 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA). An intrusion detection method for securing in-vehicle CAN bus (Sousse, 2016), pp. 176\u2013180","DOI":"10.1109\/STA.2016.7952095"},{"key":"1484_CR61","doi-asserted-by":"crossref","unstructured":"M.R. Moore, R.A. Bridges, F.L. Combs, M.S. Starr, S.J. Prowell, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research. Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection (Oak Ridge, 2017), p. 11","DOI":"10.1145\/3064814.3064816"},{"issue":"3\u20134","key":"1484_CR62","first-page":"197","volume":"7","author":"L Deng","year":"2014","unstructured":"L. Deng, D. Yu, Deep learning: Methods and applications. Foundations and Trends\u00ae. Signal Process. 7(3\u20134), 197\u2013387 (2014)","journal-title":"Signal Process."},{"issue":"6","key":"1484_CR63","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"M.J. Kang, J.W. Kang, Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 11(6), e0155781 (2016)","journal-title":"PLoS One"},{"issue":"Feb","key":"1484_CR64","first-page":"625","volume":"11","author":"D Erhan","year":"2010","unstructured":"D. Erhan, Y. Bengio, A. Courville, P.A. Manzagol, P. Vincent, S. Bengio, Why does unsupervised pre-training help deep learning? J. Mach. Learn. Res. 11(Feb), 625\u2013660 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"1484_CR65","doi-asserted-by":"crossref","unstructured":"A. Valdes, S. Cheung, in 2009 IEEE Conference on Technologies for Homeland Security. Communication pattern anomaly detection in process control systems (Boston, 2009), pp. 22\u201329","DOI":"10.1109\/THS.2009.5168010"},{"issue":"3","key":"1484_CR66","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"C. Cortes, V. Vapnik, Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"8","key":"1484_CR67","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"1484_CR68","volume-title":"SAE Technical Paper","author":"A Wasicek","year":"2015","unstructured":"A. Wasicek, A. Weimerskirch, in SAE Technical Paper. Recognizing manipulated electronic control units (No. 2015-01-0202) (2015)"},{"key":"1484_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/850153","volume":"2015","author":"Aneetha Avalappampatty Sivasamy","year":"2015","unstructured":"A. Avalappampatty Sivasamy, B. Sundan, A dynamic intrusion detection system based on multivariate Hotelling\u2019s T2 statistics approach for network environments. Sci. World J., 1\u20139 (2015, 2015)","journal-title":"The Scientific World Journal"},{"key":"1484_CR70","unstructured":"A. Qayyum, M.H. Islam, M. Jamil, in Proceedings of the IEEE Symposium on Emerging Technologies. Taxonomy of statistical based anomaly detection techniques for intrusion detection (Islamabad, 2005), pp. 270\u2013276"},{"key":"1484_CR71","doi-asserted-by":"crossref","unstructured":"M. Marchetti, D. Stabili, in 2017 IEEE Intelligent Vehicles Symposium (IV). Anomaly detection of CAN bus messages through analysis of ID sequences (Los Angeles, 2017), pp. 1577\u20131583","DOI":"10.1109\/IVS.2017.7995934"},{"key":"1484_CR72","doi-asserted-by":"crossref","unstructured":"A. Tomlinson, J. Bryans, S.A. Shaikh, H.K. Kalutarage, in 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows (Luxembourg City, 2018), pp. 231\u2013238","DOI":"10.1109\/DSN-W.2018.00069"},{"key":"1484_CR73","doi-asserted-by":"crossref","unstructured":"S.N. Narayanan, S. Mittal, A. Joshi, in 2016 IEEE International Conference on Smart Computing (SMARTCOMP). OBD_SecureAlert: An anomaly detection system for vehicles (St. Louis, 2016), pp. 1\u20136","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"1484_CR74","first-page":"466","volume-title":"International Conference on Security in Computer Networks and Distributed Systems","author":"D Krishnan","year":"2012","unstructured":"D. Krishnan, M. Chatterjee, in International Conference on Security in Computer Networks and Distributed Systems. An adaptive distributed intrusion detection system for cloud computing framework (Springer, Berlin, Heidelberg, 2012), pp. 466\u2013473"},{"issue":"2","key":"1484_CR75","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u00fd","year":"2016","unstructured":"T. Pevn\u00fd, Loda: Lightweight on-line detector of anomalies. Mach. Learn. 102(2), 275\u2013304 (2016)","journal-title":"Mach. Learn."},{"key":"1484_CR76","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/986858.986876","volume-title":"Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks","author":"CY Tseng","year":"2003","unstructured":"C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, K. Levitt, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. A specification-based intrusion detection system for AODV (2003), pp. 125\u2013134"},{"key":"1484_CR77","doi-asserted-by":"crossref","unstructured":"J.P. Amaral, L.M. Oliveira, J.J. Rodrigues, G. Han, L. Shu, in 2014 IEEE International Conference on Communications (ICC). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks (Sydney, 2014), pp. 1796\u20131801","DOI":"10.1109\/ICC.2014.6883583"},{"key":"1484_CR78","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","volume-title":"International Workshop on Recent Advances in Intrusion Detection","author":"C Kruegel","year":"2003","unstructured":"C. Kruegel, T. Toth, in International Workshop on Recent Advances in Intrusion Detection. Using decision trees to improve signature-based intrusion detection (Springer, Berlin, Heidelberg, 2003), pp. 173\u2013191"},{"key":"1484_CR79","first-page":"751004","volume":"10","author":"JD Howard","year":"1998","unstructured":"J.D. Howard, T.A. Longstaff, A common language for computer security incidents. Sandia Natl. Lab. 10, 751004 (1998)","journal-title":"Sandia Natl. Lab."},{"issue":"1","key":"1484_CR80","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"H.J. Liao, C.H.R. Lin, Y.C. Lin, K.Y. Tung, Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"1484_CR81","doi-asserted-by":"crossref","unstructured":"M. M\u00fcter, A. Groll, F.C. Freiling, in Information Assurance and Security (IAS). A structured approach to anomaly detection for in-vehicle networks (Atlanta, 2010), pp. 92\u201398","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"1484_CR82","doi-asserted-by":"crossref","unstructured":"P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S.A. Fahmy, S. Chakraborty, in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. Lightweight authentication for secure automotive networks (Grenoble, 2015), pp. 285\u2013288","DOI":"10.7873\/DATE.2015.0174"},{"issue":"2","key":"1484_CR83","doi-asserted-by":"publisher","first-page":"975","DOI":"10.5120\/13715-1478","volume":"79","author":"S Omar","year":"2013","unstructured":"S. Omar, A. Ngadi, H.H. Jebur, 0020`Machine learning techniques for anomaly detection: An overview. Int. J. Comput. Appl. 79(2), 975\u20138887 (2013). \n                    https:\/\/doi.org\/10.5120\/13715-1478","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"1484_CR84","doi-asserted-by":"publisher","first-page":"770","DOI":"10.18517\/ijaseit.7.3.2074","volume":"7","author":"NM Nawi","year":"2017","unstructured":"N.M. Nawi, A.S. Hussein, N.A. Samsudin, N.A. Hamid, M.A.M. Yunus, M.F. Ab Aziz, The Effect of Pre-Processing Techniques and Optimal Parameters selection on Back Propagation Neural Networks. Int. J. Adv. Sci. Eng. Inf. Techn. 7(3), 770\u2013777 (2017)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Techn."},{"issue":"16","key":"1484_CR85","first-page":"4102","volume":"12","author":"SA Alasadi","year":"2017","unstructured":"S.A. Alasadi, W.S. Bhaya, Review of Data Preprocessing Techniques in Data Mining. J. Eng. Appl. Sci. 12(16), 4102\u20134107 (2017)","journal-title":"J. Eng. Appl. Sci."},{"key":"1484_CR86","unstructured":"P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, G. Shroff, LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv 1607, 00148 (2016)"},{"key":"1484_CR87","doi-asserted-by":"publisher","first-page":"37523","DOI":"10.1109\/ACCESS.2018.2848106","volume":"6","author":"H Ji","year":"2018","unstructured":"H. Ji, Y. Wang, H. Qin, Y. Wang, H. Li, Comparative performance evaluation of intrusion detection methods for in-vehicle networks. IEEE Access 6, 37523\u201337532 (2018)","journal-title":"IEEE Access"},{"key":"1484_CR88","volume-title":"Presentation slides on Hack In The Box Security Conference (HITBSecConf)","author":"J Li","year":"2016","unstructured":"J. Li, in Presentation slides on Hack In The Box Security Conference (HITBSecConf). CANsee-An Automobile Intrusion Detection System (2016) [Online] \n                    http:\/\/conference.hitb.org\/hitbsecconf2016ams\/materials\/D2T1%20-%20Jun%20Li%20-%20CANSsee%20-%20An%20Automobile%20Intrusion%20Detection%20System.pdf"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1484-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1484-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1484-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T23:07:26Z","timestamp":1595027246000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1484-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":88,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1484"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1484-3","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"9 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"184"}}