{"id":"https://openalex.org/W6888009051","doi":"https://doi.org/10.18420/inf2020_78","title":"28. September - 2. Oktober 2020","display_name":"28. September - 2. Oktober 2020","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W6888009051","doi":"https://doi.org/10.18420/inf2020_78"},"language":"en","primary_location":{"id":"doi:10.18420/inf2020_78","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2020_78","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2020_78","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Schell, Oleg","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Schell, Oleg","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Reinhard, Jan Peter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reinhard, Jan Peter","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kneib, Marcel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kneib, Marcel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ring, Martin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ring, Martin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21931883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.4666999876499176,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.4666999876499176,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.06430000066757202,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.04820000007748604,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.6664999723434448},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.522599995136261},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44029998779296875},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.35830000042915344},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.3441999852657318},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.3163999915122986}],"concepts":[{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.6664999723434448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.578000009059906},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.522599995136261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5044000148773193},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44029998779296875},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3765999972820282},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.35830000042915344},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3456999957561493},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.3441999852657318},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3244999945163727},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29980000853538513},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.29019999504089355},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C2779192218","wikidata":"https://www.wikidata.org/wiki/Q16944486","display_name":"Elaboration","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.2526000142097473},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2020_78","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2020_78","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2020_78","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2020_78","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6161900758743286}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Nowadays,":[0],"vehicles":[1],"incorporate":[2],"a":[3,14,141,163],"lot":[4],"of":[5,46,73,90],"electronics,":[6],"which":[7,48],"offer":[8],"both":[9],"advanced":[10],"functionalities":[11],"but":[12],"also":[13],"great":[15],"attack":[16],"surface.":[17],"Once":[18],"having":[19],"access":[20],"to":[21,37,67,138,140,154,157],"the":[22,44,57,69,76,87,94,106,118,134,143],"communication":[23,97,107],"network,":[24],"an":[25,80,125,148],"attacker":[26],"can":[27],"control":[28],"critical":[29],"functions":[30],"like":[31],"accelerating":[32],"or":[33],"steering.":[34],"One":[35],"possibility":[36],"detect":[38],"these":[39,83,122],"malicious":[40],"intentions":[41],"consists":[42],"in":[43,56,75],"implementation":[45],"IDSs,":[47],"will":[49],"even":[50],"become":[51],"mandatory":[52],"via":[53],"UN":[54],"regulations":[55],"future.":[58],"Therefore,":[59],"it":[60],"is":[61,86,145],"important":[62],"for":[63],"manufacturers":[64],"and":[65,71,99,130],"engineers":[66],"understand":[68],"opportunities":[70],"challenges":[72],"IDSs":[74,161],"automotive":[77,126],"environment.":[78],"Giving":[79],"overview":[81],"on":[82,105,121,136,150],"detection":[84],"mechanisms":[85],"primary":[88],"goal":[89],"this":[91],"elaboration.":[92],"After":[93],"current":[95],"vehicular":[96],"architectures":[98],"protocols":[100],"are":[101,109,115,128],"outlined,":[102],"potential":[103],"attacks":[104],"network":[108],"addressed.":[110],"Afterwards,":[111],"existing":[112],"IDS":[113],"concepts":[114],"presented,":[116],"while":[117],"general":[119],"requirements":[120],"systems":[123],"from":[124],"perspective":[127],"stated":[129],"described":[131],"next.":[132],"Following":[133],"discussion":[135],"how":[137],"react":[139],"detection,":[142],"elaboration":[144],"concluded":[146],"with":[147],"outlook":[149],"what":[151],"has":[152],"still":[153],"be":[155],"achieved":[156],"successfully":[158],"integrate":[159],"present":[160],"into":[162],"vehicle.":[164]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
