{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:59:25Z","timestamp":1726106365997},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030638191"},{"type":"electronic","value":"9783030638207"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63820-7_6","type":"book-chapter","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T04:12:07Z","timestamp":1605672727000},"page":"50-58","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Deep Learning for In-Vehicle Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Elies","family":"Gherbi","sequence":"first","affiliation":[]},{"given":"Blaise","family":"Hanczar","sequence":"additional","affiliation":[]},{"given":"Jean-Christophe","family":"Janodet","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Klaudel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,17]]},"reference":[{"key":"6_CR1","unstructured":"Avatefipour, O., Malik, H.: State-of-the-art survey on in-vehicle network communication (can-bus) security and vulnerabilities. CoRR (2018)"},{"key":"6_CR2","unstructured":"Bagnall, A.J., Bostrom, A., Large, J., Lines, J.: The great time series classification bake off: an experimental evaluation of recently proposed algorithms. extended version. CoRR abs\/1602.01711 (2016)"},{"key":"6_CR3","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. CoRR abs\/1803.01271 (2018)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Dupont, G., den Hartog, J., Etalle, S., Lekidis, A.: Network intrusion detection systems for in-vehicle network - technical report. CoRR (2019)","DOI":"10.1109\/ICCVE45908.2019.8965028"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th (PST) (2018)","DOI":"10.1109\/PST.2018.8514157"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1049\/cce:19990304","volume":"10","author":"M Farsi","year":"1999","unstructured":"Farsi, M., Ratcliff, K., Barbosa, M.: An overview of controller area network. Comput. Control Eng. J. 10(3), 113\u2013120 (1999)","journal-title":"Comput. Control Eng. J."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms. In: 2017 (FUZZ-IEEE), pp. 1\u20137 (2017)","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: An unsupervised intrusion detection system for high dimensional CAN bus data. CoRR (2019)","DOI":"10.1109\/ACCESS.2020.2982544"},{"issue":"8","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ress.2010.06.026","volume":"96","author":"T Hoppe","year":"2011","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1), 11\u201325 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"6_CR11","first-page":"1","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11, 1\u201317 (2016)","journal-title":"PLoS ONE"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 31st IEEE S&P (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"6_CR13","unstructured":"Moore, M.R., Bridges, R.A., Combs, F.L., Starr, M.S., Prowell, S.J.: A data-driven approach to in-vehicle intrusion detection. In: CISRC \u20192017 (2017)"},{"key":"6_CR14","unstructured":"Nilsson, D.K., Larson, U., Picasso, F., Jonsson, E.: A first simulation of attacks in the automotive network communications protocol flexray. In: CI- SIS\u20192008 (2008)"},{"key":"6_CR15","unstructured":"Oord, V., et al.: A generative model for raw audio (2016)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Pawelec, K., Bridges, R.A., Combs, F.L.: Towards a CAN IDS based on a neural-network data field predictor. CoRR (2018)","DOI":"10.1145\/3309171.3309180"},{"key":"6_CR17","first-page":"100198","volume":"21","author":"HM Song","year":"2020","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)","journal-title":"Veh. Commun."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Young, C., Olufowobi, H., Bloom, G., Zambreno, J.: Automotive intrusion detection based on constant CAN message frequencies across vehicle driving modes. In: AutoSec (2019)","DOI":"10.1145\/3309171.3309179"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Song, H., Woo, J., Kang, H.: Automotive intrusion In-vehicle network, Controller area network (CAN), Intrusion detection, Convolutional neural network. VC (2020)","DOI":"10.1016\/j.vehcom.2019.100198"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63820-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T23:11:36Z","timestamp":1619219496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63820-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030638191","9783030638207"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63820-7_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangkok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.apnns.org\/ICONIP2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"618","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"187","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"189","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.18","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.68","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}