{"id":"https://openalex.org/W4414538558","doi":"https://doi.org/10.1109/icc52391.2025.11161372","title":"Lightweight and Effective Characterization, Screening, and Identification Process for Anomalous Road Traffic Attacks","display_name":"Lightweight and Effective Characterization, Screening, and Identification Process for Anomalous Road Traffic Attacks","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414538558","doi":"https://doi.org/10.1109/icc52391.2025.11161372"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023680896","display_name":"Jaxon Hancock","orcid":null},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jaxon Hancock","raw_affiliation_strings":["Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100606448","display_name":"Tongtong Li","orcid":"https://orcid.org/0000-0001-7506-5368"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tongtong Li","raw_affiliation_strings":["Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100445020","display_name":"Jian Ren","orcid":"https://orcid.org/0000-0003-2478-6653"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jian Ren","raw_affiliation_strings":["Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University,Electrical and Computer Engineering,East Lansing,MI,USA","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023680896"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32346578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1820","last_page":"1825"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7513999938964844},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6101999878883362},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6090999841690063},{"id":"https://openalex.org/keywords/polling","display_name":"Polling","score":0.5616999864578247},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.482699990272522},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.44200000166893005},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4251999855041504},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.3677000105381012}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7594000101089478},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7513999938964844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6175000071525574},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6101999878883362},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6090999841690063},{"id":"https://openalex.org/C204854418","wikidata":"https://www.wikidata.org/wiki/Q1362921","display_name":"Polling","level":2,"score":0.5616999864578247},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.482699990272522},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.44200000166893005},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4251999855041504},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.3677000105381012},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3264999985694885},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2897999882698059},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26089999079704285},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2565999925136566},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Smart":[0],"mapping":[1],"applications-":[2],"Google":[3],"Maps,":[4,6],"Apple":[5],"Waze-":[7],"have":[8],"become":[9],"ubiquitous":[10],"in":[11],"the":[12,17,51,58,67,77,102,137,163],"modern":[13],"smart":[14,64],"city.":[15],"While":[16],"use":[18],"of":[19,26,37,53,69,94,140,158,165,189],"these":[20,48],"apps":[21],"undoubtedly":[22],"eases":[23],"a":[24,63,91,111,174],"number":[25,68,93],"daily":[27],"frustrations,":[28],"their":[29],"rapid":[30],"acceptance":[31],"and":[32,41,73,80,109,119,161],"integration":[33],"into":[34],"every":[35],"facet":[36],"transportation,":[38],"public":[39],"safety,":[40],"disaster":[42],"response":[43],"raises":[44],"security":[45],"concerns.":[46],"Among":[47],"concerns":[49],"is":[50],"possibility":[52],"an":[54,87,107,182,187],"easily-implemented":[55],"client-side":[56],"attack;":[57],"traffic":[59,117,127,147],"state":[60],"shown":[61],"on":[62],"map":[65],"indicates":[66],"users-":[70],"not":[71],"cars-":[72],"this":[74,98],"disconnect":[75],"between":[76],"ground":[78],"truth":[79],"virtual":[81],"environment":[82],"could":[83],"be":[84],"exploited":[85],"by":[86,105,169],"adversary":[88,108,183],"simply":[89],"operating":[90],"disingenuous":[92],"client":[95,141,193],"devices.":[96,194],"In":[97],"paper":[99],"we":[100],"examine":[101],"vulnerabilities":[103],"exposed":[104],"such":[106],"propose":[110],"model":[112,134,153],"which":[113],"combines":[114],"machine":[115],"learning":[116],"prediction":[118],"real-time":[120],"statistical":[121],"analysis":[122],"to":[123,144,173,186],"screen":[124],"for":[125],"anomalous":[126],"attacks.":[128],"Extensive":[129],"simulations":[130],"suggest":[131],"that":[132,151],"our":[133,152],"greatly":[135],"increases":[136],"resources":[138],"(number":[139],"devices)":[142],"required":[143],"noticeably":[145],"influence":[146],"patterns.":[148],"We":[149],"show":[150],"correctly":[154],"identifies":[155],"54.17":[156],"%":[157,171,191],"attacks":[159,168],"immediately":[160],"reduces":[162],"duration":[164],"initially":[166],"undetected":[167],"60.4":[170],"compared":[172],"typical":[175],"polling":[176],"system":[177],"under":[178],"ideal":[179],"circumstances,":[180],"where":[181],"has":[184],"access":[185],"average":[188],"76.0":[190],"more":[192]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
