{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:13:12Z","timestamp":1717373592314},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","award":["312368\/2021-6"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.adhoc.2024.103548","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T17:34:24Z","timestamp":1715880864000},"page":"103548","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-stage deep learning-based intrusion detection system for automotive Ethernet networks"],"prefix":"10.1016","volume":"162","author":[{"ORCID":"http:\/\/orcid.org\/0009-0000-8781-9219","authenticated-orcid":false,"given":"Luigi F. Marques","family":"da Luz","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1178-2648","authenticated-orcid":false,"given":"Paulo","family":"Freitas de Araujo-Filho","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8851-2665","authenticated-orcid":false,"given":"Divanilson R.","family":"Campelo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.adhoc.2024.103548_b1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MNET.001.1900220","article-title":"Security and privacy challenges in 5G-enabled vehicular networks","volume":"34","author":"Lai","year":"2020","journal-title":"IEEE Netw."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103548_b2","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/TITS.2019.2908074","article-title":"A survey of intrusion detection for in-vehicle networks","volume":"21","author":"Wu","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2024.103548_b3","series-title":"Automotive ethernet","author":"Matheus","year":"2021"},{"issue":"2","key":"10.1016\/j.adhoc.2024.103548_b4","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TITS.2014.2320605","article-title":"Intra-vehicle networks: A review","volume":"16","author":"Tuohy","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2024.103548_b5","series-title":"IEEE standard for a transport protocol for time-sensitive applications in Bridged Local Area networks","first-page":"1","author":"IEEE","year":"2016"},{"key":"10.1016\/j.adhoc.2024.103548_b6","series-title":"IEEE standard for local and metropolitan area networks\u2013timing and synchronization for time-sensitive applications","first-page":"1","author":"IEEE","year":"2020"},{"issue":"5","key":"10.1016\/j.adhoc.2024.103548_b7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2017.1600257","article-title":"In-vehicle network attacks and countermeasures: Challenges and future directions","volume":"31","author":"Liu","year":"2017","journal-title":"IEEE Netw."},{"key":"10.1016\/j.adhoc.2024.103548_b8","first-page":"1","article-title":"A survey of attacks on controller area networks and corresponding countermeasures","author":"Jo","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2024.103548_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.107093","article-title":"Security issues and challenges in V2X : A survey","volume":"169","author":"Ghosal","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.adhoc.2024.103548_b10","series-title":"20th USENIX Security Symposium (USENIX Security 11)","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"Checkoway","year":"2011"},{"key":"10.1016\/j.adhoc.2024.103548_b11","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"23","author":"Miller","year":"2015","journal-title":"Defcon"},{"key":"10.1016\/j.adhoc.2024.103548_b12","article-title":"Convolutional neural network-based intrusion detection system for AVTP streams in automotive ethernet-based networks","volume":"29","author":"Jeong","year":"2021","journal-title":"Veh. Commun."},{"issue":"4","key":"10.1016\/j.adhoc.2024.103548_b13","doi-asserted-by":"crossref","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","article-title":"From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods","volume":"20","author":"Nisioti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"10.1016\/j.adhoc.2024.103548_b14","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1109\/JIOT.2020.3024800","article-title":"Intrusion detection for cyber\u2013physical systems using generative adversarial networks in fog environment","volume":"8","author":"Freitas de Araujo-Filho","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2024.103548_b15","doi-asserted-by":"crossref","first-page":"64270","DOI":"10.1109\/ACCESS.2018.2877890","article-title":"Benchmark analysis of representative deep neural network architectures","volume":"6","author":"Bianco","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2024.103548_b16","series-title":"UN regulation no. 155 - cyber security and cyber security management system","author":"U.N. Regulation 155","year":"2021"},{"key":"10.1016\/j.adhoc.2024.103548_b17","series-title":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference","first-page":"0954","article-title":"SOME\/IP intrusion detection using deep learning-based sequential models in automotive ethernet networks","author":"Alkhatib","year":"2021"},{"key":"10.1016\/j.adhoc.2024.103548_b18","series-title":"Anais do XL Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos","first-page":"196","article-title":"Machine learning-based intrusion detection system for automotive ethernet: Detecting cyber-attacks with a low-cost platform","author":"Carmo","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103548_b19","series-title":"2022 IEEE Intelligent Vehicles Symposium","first-page":"1731","article-title":"Unsupervised network intrusion detection system for AVTP in automotive ethernet networks","author":"Alkhatib","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103548_b20","series-title":"Anais do XLI Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos","first-page":"197","article-title":"Multi-criteria optimized deep learning-based intrusion detection system for detecting cyberattacks in automotive ethernet networks","author":"Luz","year":"2023"},{"key":"10.1016\/j.adhoc.2024.103548_b21","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TIFS.2022.3221893","article-title":"TOW-IDS: Intrusion detection system based on three overlapped wavelets for automotive ethernet","volume":"18","author":"Han","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.adhoc.2024.103548_b22","series-title":"2023 IEEE International Conference on Cyber Security and Resilience","first-page":"426","article-title":"A feature-aware semi-supervised learning approach for automotive ethernet","author":"Shibly","year":"2023"},{"key":"10.1016\/j.adhoc.2024.103548_b23","first-page":"1","article-title":"AERO: Automotive ethernet real-time observer for anomaly detection in in-vehicle networks","author":"Jeong","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.adhoc.2024.103548_b24","first-page":"1","article-title":"An efficient intrusion prevention system for CAN: Hindering cyber-attacks with a low-cost platform","author":"Freitas De Araujo-Filho","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2024.103548_b25","series-title":"2015 23nd Signal Processing and Communications Applications Conference (SIU)","first-page":"2658","article-title":"Common network attack types and defense mechanisms","author":"Da\u015f","year":"2015"},{"issue":"5","key":"10.1016\/j.adhoc.2024.103548_b26","doi-asserted-by":"crossref","first-page":"2986","DOI":"10.1109\/TII.2021.3106568","article-title":"IEEE 802.1AS clock synchronization performance evaluation of an integrated wired\u2013wireless TSN architecture","volume":"18","author":"Val","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"10.1016\/j.adhoc.2024.103548_b27","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TII.2019.2943913","article-title":"An extension to the precision time protocol (PTP) to enable the detection of cyber attacks","volume":"16","author":"Moussa","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.adhoc.2024.103548_b28","series-title":"Can-train-and-test: A curated CAN dataset for automotive intrusion detection","author":"Lampe","year":"2023"},{"key":"10.1016\/j.adhoc.2024.103548_b29","series-title":"Addressing the lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN ids data & introduction of the ROAD dataset","author":"Verma","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103548_b30","article-title":"In-vehicle network intrusion detection using deep convolutional neural network","volume":"21","author":"Song","year":"2020","journal-title":"Veh. Commun."},{"key":"10.1016\/j.adhoc.2024.103548_b31","series-title":"2018 16th Annual Conference on Privacy, Security and Trust","first-page":"1","article-title":"GIDS: GAN based intrusion detection system for in-vehicle network","author":"Seo","year":"2018"},{"issue":"7","key":"10.1016\/j.adhoc.2024.103548_b32","doi-asserted-by":"crossref","first-page":"6240","DOI":"10.1109\/TITS.2021.3085297","article-title":"A survey on cyber-security of connected and autonomous vehicles (CAVs)","volume":"23","author":"Sun","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2024.103548_b33","series-title":"2019 IEEE Global Communications Conference","first-page":"1","article-title":"Tree-based intelligent intrusion detection system in internet of vehicles","author":"Yang","year":"2019"},{"key":"10.1016\/j.adhoc.2024.103548_b34","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"10.1016\/j.adhoc.2024.103548_b35","series-title":"LilNetX: Lightweight networks with extreme model compression and structured sparsification","author":"Girish","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103548_b36","article-title":"The lottery ticket hypothesis: Training pruned neural networks","author":"Frankle","year":"2018","journal-title":"CoRR"},{"key":"10.1016\/j.adhoc.2024.103548_b37","series-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1537","article-title":"AI\/ML for network security: The emperor has no clothes","author":"Jacobs","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103548_b38","series-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","article-title":"AI\/ML and network security: The emperor has no clothes","author":"Jacobs","year":"2022"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524001598?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524001598?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T13:37:56Z","timestamp":1717335476000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870524001598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":38,"alternative-id":["S1570870524001598"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103548","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multi-stage deep learning-based intrusion detection system for automotive Ethernet networks","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103548","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103548"}}