{"id":"https://openalex.org/W4206527557","doi":"https://doi.org/10.1007/s10836-021-05973-x","title":"Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations","display_name":"Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4206527557","doi":"https://doi.org/10.1007/s10836-021-05973-x"},"language":"en","primary_location":{"id":"doi:10.1007/s10836-021-05973-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10836-021-05973-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10836-021-05973-x.pdf","source":{"id":"https://openalex.org/S200807567","display_name":"Journal of Electronic Testing","issn_l":"0923-8174","issn":["0923-8174","1573-0727"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Testing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10836-021-05973-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040706048","display_name":"Zsombor Peth\u0151","orcid":"https://orcid.org/0000-0003-3054-4669"},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Zsombor Petho","raw_affiliation_strings":["Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary"],"raw_orcid":"https://orcid.org/0000-0003-3054-4669","affiliations":[{"raw_affiliation_string":"Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057365972","display_name":"Intiyaz Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Intiyaz Khan","raw_affiliation_strings":["Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058733386","display_name":"\u00c1rp\u00e1d T\u00f6r\u00f6k","orcid":"https://orcid.org/0000-0002-1985-4095"},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"\u00c1rp\u00e1d Torok","raw_affiliation_strings":["Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Automotive Technologies, Budapest University of Technology and Economic, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040706048"],"corresponding_institution_ids":["https://openalex.org/I29770179"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":2.5564,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.88604373,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"37","issue":"5-6","first_page":"613","last_page":"621"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.7756804823875427},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6951707601547241},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6267202496528625},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.6250215768814087},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5497499108314514},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.49031952023506165},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.46562904119491577},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44759681820869446},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.43780824542045593},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.41290369629859924},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4079740643501282},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3857000172138214},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36665838956832886},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31798073649406433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2734336256980896},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22685471177101135},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21174439787864685},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.16358724236488342}],"concepts":[{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.7756804823875427},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6951707601547241},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6267202496528625},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.6250215768814087},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5497499108314514},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.49031952023506165},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.46562904119491577},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44759681820869446},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.43780824542045593},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.41290369629859924},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4079740643501282},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3857000172138214},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36665838956832886},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31798073649406433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2734336256980896},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22685471177101135},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21174439787864685},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.16358724236488342},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10836-021-05973-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10836-021-05973-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10836-021-05973-x.pdf","source":{"id":"https://openalex.org/S200807567","display_name":"Journal of Electronic Testing","issn_l":"0923-8174","issn":["0923-8174","1573-0727"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Testing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10836-021-05973-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10836-021-05973-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10836-021-05973-x.pdf","source":{"id":"https://openalex.org/S200807567","display_name":"Journal of Electronic Testing","issn_l":"0923-8174","issn":["0923-8174","1573-0727"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Testing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3946134156","display_name":null,"funder_award_id":"\u00daNKP-20-5","funder_id":"https://openalex.org/F4320328991","funder_display_name":"Innov\u00e1ci\u00f3s \u00e9s Technol\u00f3giai Miniszt\u00e9rium"},{"id":"https://openalex.org/G5117492427","display_name":null,"funder_award_id":"\u00daNKP-20-5","funder_id":"https://openalex.org/F4320326762","funder_display_name":"Nemzeti Kutat\u00e1si Fejleszt\u00e9si \u00e9s Innov\u00e1ci\u00f3s Hivatal"},{"id":"https://openalex.org/G5473984744","display_name":null,"funder_award_id":"\u00daNKP-20-5","funder_id":"https://openalex.org/F4320336675","funder_display_name":"National Research, Development and Innovation Office"},{"id":"https://openalex.org/G5511846599","display_name":null,"funder_award_id":"\u00daNKP-20","funder_id":"https://openalex.org/F4320335908","funder_display_name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap"},{"id":"https://openalex.org/G6678795712","display_name":null,"funder_award_id":"\u00daNKP-20-5","funder_id":"https://openalex.org/F4320335908","funder_display_name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap"}],"funders":[{"id":"https://openalex.org/F4320311358","display_name":"Budapesti M\u0171szaki \u00e9s Gazdas\u00e1gtudom\u00e1nyi Egyetem","ror":"https://ror.org/02w42ss30"},{"id":"https://openalex.org/F4320326762","display_name":"Nemzeti Kutat\u00e1si Fejleszt\u00e9si \u00e9s Innov\u00e1ci\u00f3s Hivatal","ror":null},{"id":"https://openalex.org/F4320328860","display_name":"Magyarorsz\u00e1g Korm\u00e1nya","ror":"https://ror.org/007ekx298"},{"id":"https://openalex.org/F4320328991","display_name":"Innov\u00e1ci\u00f3s \u00e9s Technol\u00f3giai Miniszt\u00e9rium","ror":"https://ror.org/02ey3ab96"},{"id":"https://openalex.org/F4320335908","display_name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap","ror":null},{"id":"https://openalex.org/F4320336675","display_name":"National Research, Development and Innovation Office","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4206527557.pdf","grobid_xml":"https://content.openalex.org/works/W4206527557.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W137310164","https://openalex.org/W1994937951","https://openalex.org/W1999632331","https://openalex.org/W2059362538","https://openalex.org/W2065986435","https://openalex.org/W2129687055","https://openalex.org/W2332840940","https://openalex.org/W2514968539","https://openalex.org/W2580986288","https://openalex.org/W2607127338","https://openalex.org/W2619818165","https://openalex.org/W2773713480","https://openalex.org/W2890428653","https://openalex.org/W2938818743","https://openalex.org/W2958880421","https://openalex.org/W2981346785","https://openalex.org/W3012231981","https://openalex.org/W3048255363","https://openalex.org/W3080144001","https://openalex.org/W3085550285","https://openalex.org/W3119439236","https://openalex.org/W4250346387"],"related_works":["https://openalex.org/W2089521921","https://openalex.org/W4360997342","https://openalex.org/W2993489091","https://openalex.org/W2358649166","https://openalex.org/W2366522092","https://openalex.org/W4394603702","https://openalex.org/W2340502785","https://openalex.org/W2544247437","https://openalex.org/W2954517350","https://openalex.org/W4392745689"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"article":[2],"investigates":[3],"cybersecurity":[4],"issues":[5],"related":[6],"to":[7,64],"in-vehicle":[8,71],"communication":[9,12,34],"networks.":[10],"In-vehicle":[11],"network":[13,24,35,72],"security":[14,96],"is":[15,46,86,89],"evaluated":[16],"based":[17,48],"on":[18,49],"the":[19,23,27,30,50,54,66,70,74,83,93,100,103,108],"protection":[20],"characteristics":[21,52],"of":[22,29,53,69,82],"components":[25],"and":[26,43],"topology":[28],"network.":[31],"The":[32],"automotive":[33],"topologies":[36],"are":[37],"represented":[38],"as":[39],"undirected":[40],"weighted":[41],"graphs,":[42],"their":[44],"vulnerability":[45,67],"estimated":[47],"specific":[51],"generated":[55],"graph.":[56],"Thirteen":[57],"different":[58],"vehicle":[59],"models":[60],"have":[61],"been":[62],"investigated":[63],"compare":[65],"levels":[68],"using":[73],"Dijkstra's":[75],"shortest":[76],"route":[77],"algorithm.":[78],"An":[79],"important":[80],"advantage":[81],"proposed":[84],"method":[85],"that":[87],"it":[88],"in":[90],"accordance":[91],"with":[92],"most":[94],"relevant":[95],"evaluation":[97],"models.":[98],"On":[99],"other":[101],"hand,":[102],"newly":[104],"introduced":[105],"approach":[106],"considers":[107],"Secure-by-Design":[109],"concept":[110],"principles.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
