Choi, S., Kim, J., Kwak, D., Angkititrakul, P., and Hansen,
J. H. (2007). Analysis and classification of driver be-
havior using in-vehicle can-bus information. In Bi-
ennial Workshop on DSP for In-Vehicle and Mobile
Systems, pages 17–19.
Cimitile, A., Martinelli, F., and Mercaldo, F. (2017). Ma-
chine learning meets ios malware: Identifying mali-
cious applications on apple environment. In ICISSP,
pages 487–492.
De Francesco, N., Lettieri, G., Santone, A., and Vaglini,
G. (2016). Heuristic search for equivalence checking.
Software and System Modeling, 15(2):513–530.
Kwak, B. I., Woo, J., and Kim, H. K. (2016). Know your
master: Driver profiling-based anti-theft method. In
PST 2016.
Lyamin, N., Vinel, A. V., Jonsson, M., and Loo, J. (2014).
Real-time detection of denial-of-service attacks in
ieee 802.11 p vehicular networks. IEEE Communi-
cations letters, 18(1):110–113.
Martinelli, F., Mercaldo, F., Nardone, V., and Santone, A.
(2017). Car hacking identification through fuzzy logic
algorithms. In Fuzzy Systems (FUZZ-IEEE), IEEE In-
ternational Conference on. IEEE. IEEE.
Massaro, E., Ahn, C., Ratti, C., Santi, P., Stahlmann, R.,
Lamprecht, A., Roehder, M., and Huber, M. (2017).
The car as an ambient sensing platform. Proceedings
of the IEEE, 105(1):3–7.
Meng, X., Lee, K. K., and Xu, Y. (2006). Human driving
behavior recognition based on hidden markov models.
In Robotics and Biomimetics, 2006. ROBIO’06. IEEE
International Conference on, pages 274–279. IEEE.
Mercaldo, F., Nardone, V., and Santone, A. (2017). Dia-
betes mellitus affected patients classification and diag-
nosis through machine learning techniques. Procedia
Computer Science, 112(C):2519–2528.
Mercaldo, F., Visaggio, C. A., Canfora, G., and Cimi-
tile, A. (2016). Mobile malware detection in the real
world. In Software Engineering Companion (ICSE-
C), IEEE/ACM International Conference on, pages
744–746. IEEE.
Mitchell, T. M. (1999). Machine learning and data mining.
Communications of the ACM, 42(11):30–36.
Miyajima, C., Nishiwaki, Y., Ozawa, K., Wakita, T., Itou,
K., Takeda, K., and Itakura, F. (2007). Driver mod-
eling based on driving behavior and its evaluation
in driver identification. Proceedings of the IEEE,
95(2):427–437.
Nishiwaki, Y., Ozawa, K., Wakita, T., Miyajima, C., Itou,
K., and Takeda, K. (2007). Driver identification based
on spectral analysis of driving behavioral signals. In
Advances for In-Vehicle and Mobile Systems, pages
25–34. Springer.
of Automotive Engineers, S. (1999). On-Board Diagnostics
for Light and Medium Duty Vehicles Standards Man-
ual. Society of Automotive Engineers, US.
Refaeilzadeh, P., Tang, L., and Liu, H. (2009). Cross-
validation. In Encyclopedia of database systems,
pages 532–538. Springer.
Taylor, A., Leblanc, S., and Japkowicz, N. (2016). Anomaly
detection in automobile control network data with
long short-term memory networks. In Data Science
and Advanced Analytics (DSAA), 2016 IEEE Interna-
tional Conference on, pages 130–139. IEEE.
Wakita, T., Ozawa, K., Miyajima, C., Igarashi, K.,
Katunobu, I., Takeda, K., and Itakura, F. (2006).
Driver identification using driving behavior signals.
IEICE TRANSACTIONS on Information and Systems,
89(3):1188–1194.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
372