{"id":"https://openalex.org/W4210338109","doi":"https://doi.org/10.1109/globecom46510.2021.9685130","title":"VehicleCIDS: An Efficient Vehicle Intrusion Detection System Based on Clock Behavior","display_name":"VehicleCIDS: An Efficient Vehicle Intrusion Detection System Based on Clock Behavior","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210338109","doi":"https://doi.org/10.1109/globecom46510.2021.9685130"},"language":"en","primary_location":{"id":"doi:10.1109/globecom46510.2021.9685130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685130","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081740569","display_name":"Yilin Zhao","orcid":"https://orcid.org/0000-0001-7203-227X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yilin Zhao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,Shaanxi,China,710071"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,Shaanxi,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063504839","display_name":"Yijie Xun","orcid":"https://orcid.org/0000-0002-5540-2651"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijie Xun","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,Shaanxi,China,710071"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,Shaanxi,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108050448","display_name":"Jiajia Liu","orcid":"https://orcid.org/0000-0003-4273-8866"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Liu","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081740569"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.924,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69470017,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8198447227478027},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7301722764968872},{"id":"https://openalex.org/keywords/dynamic-time-warping","display_name":"Dynamic time warping","score":0.6879218220710754},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5434125065803528},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4938128888607025},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4576070308685303},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4506639242172241},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3916156589984894},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32022958993911743},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19800207018852234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8198447227478027},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7301722764968872},{"id":"https://openalex.org/C88516994","wikidata":"https://www.wikidata.org/wiki/Q1268863","display_name":"Dynamic time warping","level":2,"score":0.6879218220710754},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5434125065803528},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4938128888607025},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4576070308685303},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4506639242172241},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3916156589984894},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32022958993911743},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19800207018852234},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom46510.2021.9685130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685130","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6728038315","display_name":null,"funder_award_id":"61771374,61771373,61801360,62001393","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7720874496","display_name":null,"funder_award_id":"31020200QD010","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W116902681","https://openalex.org/W1629374427","https://openalex.org/W2059362538","https://openalex.org/W2163212148","https://openalex.org/W2166668397","https://openalex.org/W2283896980","https://openalex.org/W2461378669","https://openalex.org/W2464037380","https://openalex.org/W2506734067","https://openalex.org/W2524044976","https://openalex.org/W2545810962","https://openalex.org/W2752558064","https://openalex.org/W2772709151","https://openalex.org/W2790772609","https://openalex.org/W2794197161","https://openalex.org/W2891250288","https://openalex.org/W2891642265","https://openalex.org/W2979202956","https://openalex.org/W3009475808","https://openalex.org/W3093548965","https://openalex.org/W4240592325","https://openalex.org/W6604828220","https://openalex.org/W6719536112","https://openalex.org/W6784036736"],"related_works":["https://openalex.org/W2388271354","https://openalex.org/W4226221049","https://openalex.org/W2378891550","https://openalex.org/W2374211671","https://openalex.org/W2110890874","https://openalex.org/W2362311214","https://openalex.org/W2517190875","https://openalex.org/W2136041290","https://openalex.org/W2311084717","https://openalex.org/W2354253294"],"abstract_inverted_index":{"Nowadays,":[0],"more":[1,3,30,55],"and":[2,10,147],"external":[4],"interfaces":[5],"are":[6],"added":[7],"into":[8],"intelligent":[9],"connected":[11],"vehicles.":[12],"The":[13,128],"in-vehicle":[14],"network,":[15],"especially":[16],"the":[17,86,96,136],"controller":[18],"area":[19],"network":[20],"(CAN),":[21],"is":[22,112],"no":[23],"longer":[24],"a":[25,54,106],"closed":[26],"environment,":[27],"which":[28,62],"provides":[29],"approaches":[31],"for":[32],"attackers":[33,48],"to":[34,64,94,114,125],"invade.":[35],"To":[36,69],"resist":[37],"attacks,":[38,72],"numerous":[39],"researchers":[40],"have":[41],"proposed":[42],"intrusion":[43,145],"detection":[44,146],"systems":[45],"(IDSs).":[46],"However,":[47],"can":[49,141],"intrude":[50],"CAN":[51],"bus":[52],"in":[53,144,149],"advanced":[56],"way,":[57],"such":[58],"as":[59],"masquerade":[60,71],"attack,":[61],"leads":[63],"failures":[65],"of":[66,99,139],"most":[67],"IDS.":[68],"counter":[70],"we":[73],"propose":[74],"an":[75],"efficient":[76],"vehicle":[77],"IDS":[78],"based":[79],"on":[80,131],"clock":[81,97],"behavior,":[82],"called":[83,109],"VehicleCIDS.":[84],"First,":[85],"system":[87],"uses":[88],"recursive":[89],"least":[90],"squares":[91],"(RLS)":[92],"algorithm":[93],"estimate":[95],"behavior":[98],"each":[100],"electronic":[101],"control":[102],"unit":[103],"(ECU).":[104],"Then,":[105],"statistical":[107],"method":[108],"empirical":[110],"rule":[111],"used":[113],"detect":[115],"attack":[116],"messages.":[117],"Finally,":[118],"it":[119],"utilizes":[120],"dynamic":[121],"time":[122],"warping":[123],"(DTW)":[124],"identify":[126],"attackers.":[127],"experimental":[129],"results":[130],"real":[132],"vehicles":[133],"show":[134],"that":[135],"recognition":[137],"rate":[138],"VehicleCIDS":[140],"achieve":[142],"98.52%":[143],"87.71%":[148],"attacker":[150],"identification.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
