{"id":"https://openalex.org/W4360585259","doi":"https://doi.org/10.1109/ic3i56241.2022.10073107","title":"Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections","display_name":"Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585259","doi":"https://doi.org/10.1109/ic3i56241.2022.10073107"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10073107","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10073107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077874497","display_name":"Aasheesh Raizada","orcid":null},"institutions":[{"id":"https://openalex.org/I3131826223","display_name":"The Sanskrit College and University","ror":"https://ror.org/04pr7ha69","country_code":"IN","type":"education","lineage":["https://openalex.org/I3131826223"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aasheesh Raizada","raw_affiliation_strings":["Sanskriti University,Department of Computer Science Engineering,Mathura,Uttar Pradesh,India","Department of Computer Science Engineering, Sanskriti University, Mathura, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Sanskriti University,Department of Computer Science Engineering,Mathura,Uttar Pradesh,India","institution_ids":["https://openalex.org/I3131826223"]},{"raw_affiliation_string":"Department of Computer Science Engineering, Sanskriti University, Mathura, Uttar Pradesh, India","institution_ids":["https://openalex.org/I3131826223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071998361","display_name":"Manbir Kaur Brar","orcid":null},"institutions":[{"id":"https://openalex.org/I860003557","display_name":"Punjab Engineering College","ror":"https://ror.org/00bsj2955","country_code":"IN","type":"education","lineage":["https://openalex.org/I860003557"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manbir Kaur Brar","raw_affiliation_strings":["Chandigarh Engineering College,Department of Computer Science &#x0026; Engineering,Jhanjeri,India"],"affiliations":[{"raw_affiliation_string":"Chandigarh Engineering College,Department of Computer Science &#x0026; Engineering,Jhanjeri,India","institution_ids":["https://openalex.org/I860003557"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077874497"],"corresponding_institution_ids":["https://openalex.org/I3131826223"],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51501734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7193832397460938},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6695593595504761},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6597772836685181},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.6396665573120117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6213737726211548},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5348780155181885},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.47691866755485535},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.47180286049842834},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20015552639961243},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10242608189582825}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7193832397460938},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6695593595504761},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6597772836685181},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.6396665573120117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6213737726211548},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5348780155181885},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.47691866755485535},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.47180286049842834},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20015552639961243},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10242608189582825},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10073107","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10073107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W135902891","https://openalex.org/W1538836445","https://openalex.org/W1598796236","https://openalex.org/W1742813727","https://openalex.org/W1988918299","https://openalex.org/W1995126785","https://openalex.org/W2208028087","https://openalex.org/W2296509296","https://openalex.org/W2570296101","https://openalex.org/W2743483681","https://openalex.org/W2783741806","https://openalex.org/W2809932464","https://openalex.org/W2953180207","https://openalex.org/W2954048722","https://openalex.org/W6605567061","https://openalex.org/W6635679246"],"related_works":["https://openalex.org/W2093262417","https://openalex.org/W2123131699","https://openalex.org/W913131694","https://openalex.org/W650116260","https://openalex.org/W2378329187","https://openalex.org/W4390790060","https://openalex.org/W2134191509","https://openalex.org/W1603423477","https://openalex.org/W3209454962","https://openalex.org/W2133389611"],"abstract_inverted_index":{"A":[0],"need":[1],"for":[2,21],"enhancing":[3],"our":[4],"everyday":[5],"lives":[6],"is":[7,19,78],"the":[8,39,105,110,117,122],"widespread":[9],"use":[10],"of":[11,38,112,116],"interconnected":[12],"and":[13,46,62,73,97,108],"interoperable":[14],"computer":[15],"systems.":[16],"The":[17,76,114],"same":[18],"true":[20],"exploitable":[22],"defects":[23],"that":[24],"are":[25,32],"uncontrollable":[26],"by":[27],"humans.":[28],"Computer":[29],"security":[30,44,54],"methods":[31],"necessary":[33],"to":[34,51,71,133],"handle":[35],"contact":[36],"because":[37],"weaknesses.":[40],"Reliable":[41],"connection":[42],"requires":[43],"standards":[45],"advancements":[47],"in":[48,131],"protection":[49],"measures":[50],"counter":[52],"escalating":[53],"issues.":[55],"This":[56],"paper":[57],"offers":[58],"building":[59],"an":[60],"adaptive":[61,89],"durable":[63],"intrusion":[64],"detection":[65],"system":[66],"utilizing":[67],"deep":[68,83],"learning":[69,81],"systems":[70,85],"recognize":[72],"categorise":[74],"cyber-attacks.":[75],"emphasis":[77],"on":[79],"how":[80],"or":[82,99],"neuronal":[84],"(DCNNs)":[86],"may":[87],"aid":[88],"IDS":[90],"with":[91],"developing":[92],"capabilities":[93],"discern":[94],"between":[95],"known":[96],"new":[98],"negligible":[100],"networking":[101],"detectable":[102],"qualities,":[103],"disconnecting":[104],"intrusive":[106],"party":[107],"reducing":[109],"danger":[111],"exposure.":[113],"effectiveness":[115],"model":[118],"was":[119],"shown":[120],"using":[121],"UNSW-NB15":[123],"database,":[124],"whose":[125],"represents":[126],"real":[127],"current":[128],"network":[129],"activity":[130],"addition":[132],"artificially":[134],"constructed":[135],"attack":[136],"behavior.":[137]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
