{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:58:10Z","timestamp":1762016290087,"version":"build-2065373602"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/softcom.2019.8903789","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:21:37Z","timestamp":1574691697000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Hidden Markov Model For Anomaly Detection In CAN Bus Networks"],"prefix":"10.23919","author":[{"given":"Safa","family":"Boumiza","sequence":"first","affiliation":[{"name":"PRINCE Research Laboratory, ISITCOM-University of Sousse,Hammam Sousse,Tunisia"}]},{"given":"Rafik","family":"Braham","sequence":"additional","affiliation":[{"name":"PRINCE Research Laboratory, ISITCOM-University of Sousse,Hammam Sousse,Tunisia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2018.089430"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145054"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020467"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00112-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.42"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.004"},{"key":"ref4","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"91","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref3","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref7","article-title":"Controller Area Network - Basics, Protocols, Chips and Applications","author":"etschberger","year":"2001","journal-title":"IXXAT Automation"},{"key":"ref2","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"}],"event":{"name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2019,9,19]]},"location":"Split, Croatia","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892589\/8903594\/08903789.pdf?arnumber=8903789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:21:18Z","timestamp":1755800478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8903789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/softcom.2019.8903789","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}