{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:08:34Z","timestamp":1730221714699,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1109\/fmec54266.2021.9732568","type":"proceedings-article","created":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T20:00:52Z","timestamp":1647460852000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI\/ML"],"prefix":"10.1109","author":[{"given":"Fahad","family":"Siddiqui","sequence":"first","affiliation":[{"name":"Queen's University Belfast,The Centre for Secure Information Technologies (CSIT),Belfast,United Kingdom"}]},{"given":"Rafiullah","family":"Khan","sequence":"additional","affiliation":[{"name":"Queen's University Belfast,The Centre for Secure Information Technologies (CSIT),Belfast,United Kingdom"}]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[{"name":"Queen's University Belfast,The Centre for Secure Information Technologies (CSIT),Belfast,United Kingdom"}]}],"member":"263","reference":[{"journal-title":"Hackers Are Stealing Keyless Entry Cars with a $200 Device","year":"2016","key":"ref10"},{"journal-title":"Keen Lab hackers managed to take control of Tesla vehicles again","year":"2017","key":"ref11"},{"journal-title":"New vehicle security research by keenlab Experimental security assessment of bmw cars","year":"2018","key":"ref12"},{"journal-title":"Tesla's autopilot tricked into driving on the wrong side of the road","year":"2019","key":"ref13"},{"journal-title":"Hackers can trick a Tesla into accel-erating by 50 miles per hour","year":"2020","key":"ref14"},{"journal-title":"AUTOSAR Enabling Continous Innovation","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3054934"},{"journal-title":"AUTOSAR Classic Platform","year":"0","key":"ref17"},{"journal-title":"Volkswagen recalls Audi A3s on pas-senger air bag concerns","year":"2021","key":"ref18"},{"journal-title":"Daimler will recall 2 6M Mercedes cars in China","year":"2021","key":"ref19"},{"journal-title":"UK on the cusp of a transport revolution as self-driving vehicles set to be worth nearly £42 billion by 2035","year":"2021","key":"ref4"},{"key":"ref27","article-title":"Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses","volume":"abs 2012 1 544","author":"goldblum","year":"2020","journal-title":"CoRR"},{"journal-title":"Upstream Security's 2021 Global Automotive Cybersecurity Report","year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100214"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"journal-title":"Hackers Remotely Kill a Jeep on the Highway - With Me in It","year":"2015","key":"ref8"},{"journal-title":"Cybersecurity challenges in the uptake of Artificial Intelligence in Autonomous Driving","year":"2021","author":"dede","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585575"},{"journal-title":"After Jeep Hack Chrysler Recalls 1 4M Vehicles for Bug Fix","year":"2015","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2971482"},{"journal-title":"AUTOSAR Adaptive Platform","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949052"},{"journal-title":"AUTOSAR Security Adaptive Platform Must Focus on Holistic Vehicle Protection","year":"2020","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_12"},{"journal-title":"ISO\/SAE FDIS 21434 Road vehicles - Cybersecurity engi-neering","year":"2020","key":"ref23"},{"key":"ref26","first-page":"123","article-title":"ISO\/SAE DIS 21434 Automotive Cybersecurity Stan-dard - In a Nutshell","author":"georg","year":"2020","journal-title":"Computer Safety Reliability and Security SAFECOMP Workshops"},{"journal-title":"ISO\/SAE 21434 Setting the Standard for Automotive Cybersecurity","year":"2020","key":"ref25"}],"event":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2021,12,6]]},"location":"Gandia, Spain","end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9732403\/9732404\/09732568.pdf?arnumber=9732568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:23:02Z","timestamp":1669666982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9732568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/fmec54266.2021.9732568","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]}}}