{"id":"https://openalex.org/W4281623902","doi":"https://doi.org/10.1109/noms54207.2022.9789829","title":"Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems","display_name":"Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4281623902","doi":"https://doi.org/10.1109/noms54207.2022.9789829"},"language":"en","primary_location":{"id":"doi:10.1109/noms54207.2022.9789829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789829","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074678857","display_name":"Himanshi Babbar","orcid":"https://orcid.org/0000-0003-4580-6617"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Himanshi Babbar","raw_affiliation_strings":["Chitkara University,Chitkara University Institute of Engineering and Technology,Rajpura,India","Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Chitkara University Institute of Engineering and Technology,Rajpura,India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058266644","display_name":"Ouns Bouachir","orcid":"https://orcid.org/0000-0001-9616-4488"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ouns Bouachir","raw_affiliation_strings":["Zayed University,College of Technological Innovation (CTI),UAE","College of Technological Innovation (CTI), Zayed University, UAE"],"affiliations":[{"raw_affiliation_string":"Zayed University,College of Technological Innovation (CTI),UAE","institution_ids":["https://openalex.org/I91044093"]},{"raw_affiliation_string":"College of Technological Innovation (CTI), Zayed University, UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004251248","display_name":"Shalli Rani","orcid":"https://orcid.org/0000-0002-8474-9435"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Shalli Rani","raw_affiliation_strings":["Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),Machine Learning Department,UAE","Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), UAE"],"affiliations":[{"raw_affiliation_string":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),Machine Learning Department,UAE","institution_ids":["https://openalex.org/I4210113480"]},{"raw_affiliation_string":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), UAE","institution_ids":["https://openalex.org/I4210113480"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020975697","display_name":"Moayad Aloqaily","orcid":"https://orcid.org/0000-0003-2443-7234"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Moayad Aloqaily","raw_affiliation_strings":["Chitkara University,Chitkara University Institute of Engineering and Technology,Rajpura,India","Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Chitkara University Institute of Engineering and Technology,Rajpura,India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074678857"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":1.074,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71780329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7673770785331726},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7228610515594482},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6426740884780884},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6256029605865479},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5582202076911926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5370907187461853},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5188775658607483},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5008368492126465},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.488798588514328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46919605135917664},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3418040871620178}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7673770785331726},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7228610515594482},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6426740884780884},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6256029605865479},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5582202076911926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5370907187461853},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5188775658607483},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5008368492126465},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.488798588514328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46919605135917664},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3418040871620178},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms54207.2022.9789829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789829","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2782735691","https://openalex.org/W2906986429","https://openalex.org/W2913975235","https://openalex.org/W2956030019","https://openalex.org/W2985152984","https://openalex.org/W3000225415","https://openalex.org/W3084346886","https://openalex.org/W3092688604","https://openalex.org/W3093547393","https://openalex.org/W3114263020","https://openalex.org/W3150736300","https://openalex.org/W3158456479","https://openalex.org/W3159037623","https://openalex.org/W3160220648","https://openalex.org/W3183117264","https://openalex.org/W4200051263","https://openalex.org/W6798265924"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"Intelligent":[0],"Transportation":[1],"Systems":[2],"(ITS),":[3],"mainly":[4],"Autonomous":[5],"Vehicles":[6],"(AV's),":[7],"are":[8,41],"susceptible":[9],"to":[10,53,126],"security":[11,25,60],"and":[12,29,67,110,162],"safety":[13],"problems":[14],"that":[15,143],"risk":[16],"the":[17,24,55,59,81,86,102,115,118,131,135,153,159],"users'":[18],"lives.":[19,39],"Sophisticated":[20],"threats":[21],"can":[22],"damage":[23],"of":[26,88,105,117,138,155],"AV's":[27],"communications":[28],"computational":[30],"capabilities,":[31],"slowing":[32],"down":[33],"their":[34,112],"integration":[35],"into":[36],"our":[37],"daily":[38],"Cyber-attacks":[40],"getting":[42],"more":[43],"complex,":[44],"posing":[45],"greater":[46],"hurdles":[47],"in":[48,80,93,99,158],"identifying":[49],"intrusions":[50,56],"effectively.":[51],"Failing":[52],"prevent":[54],"could":[57],"tarnish":[58],"services'":[61],"reliability,":[62],"including":[63],"data":[64,160],"confidentiality,":[65],"authenticity,":[66],"reliability.":[68],"IDS":[69],"is":[70,149],"an":[71],"overall":[72],"prediction":[73],"paradigm":[74],"for":[75,134,152],"detecting":[76],"malicious":[77],"network":[78],"traffic":[79],"ITS.":[82],"This":[83],"article":[84],"studies":[85],"role":[87],"machine":[89],"or":[90],"deep":[91,107],"learning":[92,108],"Software":[94],"Defined-Intrusion":[95],"Detection":[96],"System":[97],"(SD-IDS)":[98],"ITS;":[100],"discusses":[101],"mathematical":[103],"analysis":[104],"existing":[106,136],"models":[109],"evaluates":[111],"performances":[113],"on":[114],"basis":[116],"various":[119],"metrics":[120],"(i.e.,":[121],"accuracy,":[122],"precision,":[123],"recall,":[124],"f-measure)":[125],"observe":[127],"which":[128],"model":[129],"gives":[130],"best":[132,150],"results":[133,141],"state":[137],"art.":[139],"The":[140],"show":[142],"improved":[144],"Recurrent":[145],"Neural":[146],"Networks":[147],"(RNN)":[148],"suited":[151],"detection":[154],"SD-IDS":[156],"attacks":[157],"plane":[161],"control":[163],"plane.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
