{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:14:30Z","timestamp":1725714870566},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccve.2014.7297695","type":"proceedings-article","created":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T18:44:18Z","timestamp":1444934658000},"page":"941-942","source":"Crossref","is-referenced-by-count":10,"title":["Standardization challenges for safety and security of connected, automated and intelligent vehicles"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Schmittner","sequence":"first","affiliation":[]},{"given":"Zhendong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Gruber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10557-4_31"},{"journal-title":"Proceedings of the 20th USENIX Conference on Security","article-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","year":"2011","author":"checkoway","key":"ref3"},{"journal-title":"IEEE Std","article-title":"IEEE 1609.2 IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"journal-title":"IEEE Std","article-title":"802.11, Wireless LANs","year":"0","key":"ref11"},{"journal-title":"Workshop on Hot Topics in Networks (HotNets-IV)","article-title":"Challenges in securing vehicular networks","year":"2005","author":"parno","key":"ref5"},{"journal-title":"ISO\/IEC Std","article-title":"ISO\/IEC 27000 Information Security Management Systems (ISMS) standards","year":"0","key":"ref12"},{"year":"0","key":"ref8","article-title":"IEC 61508:2010 - Functional Safety of Electrical\/Electronic\/Programmable Electronic Safety-related Systems"},{"journal-title":"Functional Safety","article-title":"ISO 26262:2010 Road vehicles","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"journal-title":"ISO\/IEC Std","article-title":"ISO\/IEC 15408, Common Criteria for Information Technology Security Evaluation, V3.1","year":"0","key":"ref9"},{"journal-title":"DefCon","article-title":"Hacking US (and UK, Australia, France, etc.) traffic control systems","year":"2014","author":"cerrudo","key":"ref1"}],"event":{"name":"2014 International Conference on Connected Vehicles and Expo (ICCVE)","start":{"date-parts":[[2014,11,3]]},"location":"Vienna, Austria","end":{"date-parts":[[2014,11,7]]}},"container-title":["2014 International Conference on Connected Vehicles and Expo (ICCVE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7284675\/7297490\/07297695.pdf?arnumber=7297695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:48:26Z","timestamp":1490377706000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7297695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccve.2014.7297695","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}