{"id":"https://openalex.org/W3184722671","doi":"https://doi.org/10.1109/isdfs52919.2021.9486370","title":"Fuzzy Rule Based Classification System from Vehicle-to-Grid Data","display_name":"Fuzzy Rule Based Classification System from Vehicle-to-Grid Data","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3184722671","doi":"https://doi.org/10.1109/isdfs52919.2021.9486370","mag":"3184722671"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs52919.2021.9486370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs52919.2021.9486370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053073449","display_name":"G\u00fcls\u00fcm Akkuzu Kaya","orcid":"https://orcid.org/0000-0003-1806-7759"},"institutions":[{"id":"https://openalex.org/I161597582","display_name":"Recep Tayyip Erdo\u011fan University","ror":"https://ror.org/0468j1635","country_code":"TR","type":"education","lineage":["https://openalex.org/I161597582"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Gulsum Akkuzu Kaya","raw_affiliation_strings":["Computer Engineering, Rize Recep Tayyip Erdogan University, Rize, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, Rize Recep Tayyip Erdogan University, Rize, Turkey","institution_ids":["https://openalex.org/I161597582"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032674762","display_name":"Abdul Badwan","orcid":null},"institutions":[{"id":"https://openalex.org/I184461854","display_name":"University of Winchester","ror":"https://ror.org/03fmjzx88","country_code":"GB","type":"education","lineage":["https://openalex.org/I184461854"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abdul Badwan","raw_affiliation_strings":["Department of Digital Technology and Solutions, University of Winchester, Winchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Digital Technology and Solutions, University of Winchester, Winchester, United Kingdom","institution_ids":["https://openalex.org/I184461854"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053073449"],"corresponding_institution_ids":["https://openalex.org/I161597582"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07022306,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10768","display_name":"Electric Vehicles and Infrastructure","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10768","display_name":"Electric Vehicles and Infrastructure","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10663","display_name":"Advanced Battery Technologies Research","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12617","display_name":"Energy, Environment, and Transportation Policies","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/2105","display_name":"Renewable Energy, Sustainability and the Environment"},"field":{"id":"https://openalex.org/fields/21","display_name":"Energy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7313576936721802},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6011115908622742},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.586891233921051},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5249136686325073},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.45845192670822144},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.42827892303466797},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.42179811000823975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41962218284606934},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.41770100593566895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35459500551223755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7313576936721802},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6011115908622742},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.586891233921051},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5249136686325073},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.45845192670822144},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.42827892303466797},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.42179811000823975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41962218284606934},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.41770100593566895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35459500551223755},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs52919.2021.9486370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs52919.2021.9486370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2033274527","https://openalex.org/W2039008359","https://openalex.org/W2083852337","https://openalex.org/W2092958856","https://openalex.org/W2131539632","https://openalex.org/W2323470945","https://openalex.org/W2415839200","https://openalex.org/W2596351484","https://openalex.org/W2913497771","https://openalex.org/W2914057541","https://openalex.org/W2964850583","https://openalex.org/W2979727854","https://openalex.org/W3005914582","https://openalex.org/W3010683696","https://openalex.org/W3038464162","https://openalex.org/W3040251430","https://openalex.org/W3043354127","https://openalex.org/W3045247705","https://openalex.org/W3047145943","https://openalex.org/W3080847572","https://openalex.org/W4284973418"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4205240985"],"abstract_inverted_index":{"Vehicle-to-Grid":[0],"(V2G)":[1],"system":[2,47,98,124],"is":[3,39,75,99,110,125],"becoming":[4],"a":[5,89,96,122],"very":[6],"popular":[7],"concept":[8],"since":[9],"it":[10,28,92],"has":[11,33],"various":[12],"benefits":[13],"such":[14,73],"as":[15],"reducing":[16],"energy":[17],"consumption,":[18],"being":[19],"environmental":[20],"friendly,":[21],"bi-directional":[22],"charging,":[23],"and":[24,32,131],"load":[25],"balancing.":[26],"Although,":[27],"gets":[29],"highly":[30],"remarkable":[31],"many":[34],"advantages,":[35],"V2G":[36,46,90,97],"system\u2019s":[37,107],"security":[38,43],"extremely":[40],"challenging.":[41],"Any":[42],"flaw":[44],"in":[45,88,120,135,142],"can":[48],"cause":[49],"serious":[50],"issues":[51,56],"on":[52,63,72],"the":[53,64,68,106],"system.":[54,65],"Security":[55],"might":[57],"open":[58],"doors":[59],"to":[60,101,137],"severe":[61],"damages":[62],"One":[66],"of":[67,144],"most":[69],"danger":[70],"damage":[71],"systems":[74],"disclosed":[76],"confidential":[77,85,108],"information.":[78],"This":[79],"work":[80],"therefore":[81],"analyses":[82,94],"what":[83],"are":[84],"information":[86,109],"features":[87],"system,":[91],"then":[93],"whether":[95],"vulnerable":[100],"attacks":[102],"or":[103],"not":[104],"if":[105],"revealed.":[111],"To":[112],"do":[113],"that,":[114],"this":[115],"study":[116],"used":[117],"fuzzy-classification":[118,151],"technique":[119,152],"which":[121],"fuzzy":[123],"developed.":[126],"It":[127],"also":[128],"applied":[129,139],"SVM":[130],"NB":[132],"classification":[133,140],"techniques":[134,141],"order":[136],"compare":[138],"terms":[143],"their":[145],"performances.":[146],"Comparison":[147],"results":[148],"showed":[149],"that":[150],"performed":[153],"better":[154],"than":[155],"other":[156],"two":[157],"techniques.":[158]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
