{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:35:38Z","timestamp":1752230138820,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811048","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:32Z","timestamp":1656965372000},"page":"309-330","source":"Crossref","is-referenced-by-count":21,"title":["Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security"],"prefix":"10.23919","author":[{"given":"Sampath","family":"Rajapaksha","sequence":"first","affiliation":[{"name":"Robert Gordon University,School of Computing,Aberdeen,United Kingdom"}]},{"given":"Harsha","family":"Kalutarage","sequence":"additional","affiliation":[{"name":"Robert Gordon University,School of Computing,Aberdeen,United Kingdom"}]},{"given":"M. Omar","family":"Al-Kadri","sequence":"additional","affiliation":[{"name":"Birmingham City University,School of Computing and Digital Technologies,Birmingham,United Kingdom"}]},{"given":"Garikayi","family":"Madzudzo","sequence":"additional","affiliation":[{"name":"Horiba-MIRA,Coventry,United Kingdom"}]},{"given":"Andrei V.","family":"Petrovski","sequence":"additional","affiliation":[{"name":"Robert Gordon University,School of Computing,Aberdeen,United Kingdom"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3416014.3424581"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWECAI50956.2020.00027"},{"key":"ref31","article-title":"Efficient estimation of word representations in vector space&#x2019;","author":"mikolov","year":"2013","journal-title":"1st Int Conf Learn Represent ICLR 2013 &#x2013; Workshop Track Proc"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.004"},{"key":"ref10","article-title":"ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)&#x2019;","volume":"14600","author":"verma","year":"2020","journal-title":"2012 arXiv preprint arXiv"},{"journal-title":"Design and implementation of an intrusion detection system (ids) for in-vehicle networks","year":"2017","author":"salman","key":"ref11"},{"key":"ref12","article-title":"VehicleEIDS: A Novel External Intrusion Detection System Based on Vehicle Voltage Signals&#x2019;","author":"xun","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208223"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISC253183.2021.9562830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101974"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3359999.3360496"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref4","first-page":"720","article-title":"State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities&#x2019;","volume":"6","author":"avatefipour","year":"2017","journal-title":"IJCSNS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73512-2"},{"article-title":"CAN Message Injection&#x2019;","year":"2016","author":"miller","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref5","article-title":"0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars&#x2019;","author":"cai","year":"2019","journal-title":"Black Hat USA"},{"article-title":"Heavy On Connectivity, Light On Security: The Challenges Of Vehicle Manufacturers&#x2019;","year":"2021","author":"engstler","key":"ref8"},{"key":"ref7","article-title":"Free-fall: Hacking Tesla from wireless to CAN bus&#x2019;","author":"nie","year":"2017","journal-title":"Black Hat USA"},{"article-title":"This Car Runs on Code&#x2019;","year":"2021","author":"charette","key":"ref2"},{"article-title":"Tesla is challenging hackers to crack its car, and it is putting ? ${\\$}$1 million on the line","year":"2020","author":"lambert","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101857"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops48775.2020.9156250"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3431233"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4271\/11-01-02-0005"},{"key":"ref25","article-title":"Detecting Attacks on the CAN Protocol With Machine Learning&#x2019;","author":"chockalingam","year":"2016","journal-title":"Annu EECS"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","start":{"date-parts":[[2022,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811048.pdf?arnumber=9811048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:49:50Z","timestamp":1661809790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811048","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}