{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:05:08Z","timestamp":1747973108191,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/ddecs63720.2025.11006793","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:37:05Z","timestamp":1747849025000},"page":"49-54","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating DoS Attacks on CAN: A Priority-Raise Approach and Its Timing Analysis"],"prefix":"10.1109","author":[{"given":"Mingqing","family":"Zhang","sequence":"first","affiliation":[{"name":"TU Chemnitz,Department of Computer Science,Germany"}]},{"given":"Alejandro","family":"Masrur","sequence":"additional","affiliation":[{"name":"TU Chemnitz,Department of Computer Science,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.98444"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056650"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045972"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3154346"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774712"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2019.8864567"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00104"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2023.3333843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.3011036"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00088"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s20082364"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69835-9_71"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401087"},{"key":"ref15","article-title":"Applying Intrusion Detection to Automotive IT-early Insights and Remaining Challenges","author":"Hoppe","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961344"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826522"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2022.3166394"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.2991953"}],"event":{"name":"2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)","start":{"date-parts":[[2025,5,5]]},"location":"Lyon, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx8\/11006671\/11006672\/11006793.pdf?arnumber=11006793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:39:18Z","timestamp":1747892358000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/11006793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":19,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ddecs63720.2025.11006793","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}