{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T09:51:50Z","timestamp":1777110710395,"version":"3.51.4"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/asianhost.2018.8607178","type":"proceedings-article","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T23:30:36Z","timestamp":1547163036000},"page":"86-91","source":"Crossref","is-referenced-by-count":21,"title":["A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network"],"prefix":"10.1109","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yiming","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Zhaojun","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yasser","family":"Shoukry","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref3","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/SOCC.2018.8618564","article-title":"An entropy analysis based intrusion detection system for controller area network in vehicles","author":"wang","year":"2018","journal-title":"System-on-Chip Conference (SOCC) 2018 31th IEEE International"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2521642"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref5","first-page":"22","article-title":"Automotive cybersecurity for in-vehicle communication","volume":"6","author":"han","year":"2014","journal-title":"IQT Quarterly"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","article-title":"Security threats to automotive can networks&#x2013;practical examples and selected short-term countermeasures","author":"hoppe","year":"2008","journal-title":"International Conference on Computer Safety Reliability and Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"ref9","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"}],"event":{"name":"2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","location":"Hong Kong","start":{"date-parts":[[2018,12,17]]},"end":{"date-parts":[[2018,12,18]]}},"container-title":["2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8596738\/8607158\/08607178.pdf?arnumber=8607178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T23:27:24Z","timestamp":1720913244000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8607178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":12,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/asianhost.2018.8607178","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}