{"id":"https://openalex.org/W4311926297","doi":"https://doi.org/10.1109/sin56466.2022.9970494","title":"Analysis of Smart Cities Security: Challenges and Advancements","display_name":"Analysis of Smart Cities Security: Challenges and Advancements","publication_year":2022,"publication_date":"2022-11-11","ids":{"openalex":"https://openalex.org/W4311926297","doi":"https://doi.org/10.1109/sin56466.2022.9970494"},"language":"en","primary_location":{"id":"doi:10.1109/sin56466.2022.9970494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin56466.2022.9970494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064785400","display_name":"Mehdi Houichi","orcid":"https://orcid.org/0009-0008-0255-9904"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehdi Houichi","raw_affiliation_strings":["University of Carthage, Higher School of Communication of Tunis (Sup&#x0027;Com),Digital Security Research Lab,Tunis,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communication of Tunis (Sup&#x0027;Com),Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Jaidi","raw_affiliation_strings":["University of Carthage, Higher School of Communication of Tunis (Sup&#x0027;Com),Digital Security Research Lab,Tunis,Tunisia","University of Carthage, National School of Engineers of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communication of Tunis (Sup&#x0027;Com),Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"University of Carthage, National School of Engineers of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107395150","display_name":"Adel Bouhoula","orcid":null},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["College of Graduate Studies, Arabian Gulf University,Department of Next-Generation Computing,Kingdom of Bahrain","Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Graduate Studies, Arabian Gulf University,Department of Next-Generation Computing,Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]},{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064785400"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":2.4241,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91190889,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"05"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7108567357063293},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.6507811546325684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.613523542881012},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.5715508460998535},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5649961829185486},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5219180583953857},{"id":"https://openalex.org/keywords/sustainable-development","display_name":"Sustainable development","score":0.4513244032859802},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.4303748309612274},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3358856737613678},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3309784531593323},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2973916530609131},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.21248483657836914},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1588817834854126},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10936576128005981},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08270716667175293}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7108567357063293},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.6507811546325684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.613523542881012},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.5715508460998535},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5649961829185486},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5219180583953857},{"id":"https://openalex.org/C552854447","wikidata":"https://www.wikidata.org/wiki/Q131201","display_name":"Sustainable development","level":2,"score":0.4513244032859802},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.4303748309612274},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3358856737613678},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3309784531593323},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2973916530609131},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.21248483657836914},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1588817834854126},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10936576128005981},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08270716667175293},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin56466.2022.9970494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin56466.2022.9970494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2100320843","https://openalex.org/W2392113277","https://openalex.org/W2581042172","https://openalex.org/W2610727334","https://openalex.org/W2706591630","https://openalex.org/W2752737474","https://openalex.org/W2763978449","https://openalex.org/W2830748729","https://openalex.org/W2886348552","https://openalex.org/W2900108361","https://openalex.org/W2933102709","https://openalex.org/W2934826843","https://openalex.org/W2958775402","https://openalex.org/W2982191265","https://openalex.org/W2988539063","https://openalex.org/W3021157052","https://openalex.org/W3023751456","https://openalex.org/W3034175800","https://openalex.org/W3043530913","https://openalex.org/W3043609867","https://openalex.org/W3045601073","https://openalex.org/W3080294124","https://openalex.org/W3164159410"],"related_works":["https://openalex.org/W1939054760","https://openalex.org/W2010532256","https://openalex.org/W1999404995","https://openalex.org/W3086648155","https://openalex.org/W2911665507","https://openalex.org/W2225266572","https://openalex.org/W2582198160","https://openalex.org/W2495453524","https://openalex.org/W3075663611","https://openalex.org/W2757106578"],"abstract_inverted_index":{"Smart":[0],"cities":[1,83,108,130],"are":[2,9],"made":[3],"up":[4],"of":[5,24,28,49,54,106,126,135,154,185,193,199],"various":[6],"components":[7,12],"that":[8,147],"interconnected.":[10],"These":[11],"exchange":[13],"data":[14],"on":[15],"an":[16,133],"ongoing":[17],"basis":[18],"and":[19,30,56,60,67,101,103,109,131,158,165,169,176,183,208],"they":[20],"facilitate":[21],"the":[22,104,110,123,140,152,181,197,209],"lives":[23],"citizens.":[25],"Its":[26],"use":[27,53],"Information":[29],"Communication":[31],"Technology":[32],"(ICT)":[33],"was":[34],"a":[35,47,64,73,86,117,191],"key":[36],"factor":[37],"in":[38,92,128],"its":[39],"sustainable":[40],"development.":[41],"Nonetheless,":[42],"this":[43,93,96],"development":[44],"contributed":[45],"to":[46,174,190,195],"rise":[48],"safety":[50],"threats,":[51],"criminal":[52],"information":[55],"several":[57],"other":[58],"security":[59,66,127,137],"privacy":[61,68],"challenges.":[62,138],"As":[63],"result,":[65],"concerns":[69],"have":[70,84],"emerged":[71],"as":[72],"significant":[74],"problem":[75],"for":[76,81,88],"smart":[77,82,107,129],"cities.":[78],"Safety":[79],"factors":[80],"become":[85],"concern":[87],"all":[89],"those":[90],"involved":[91],"field.":[94],"In":[95,116,139],"study,":[97],"we":[98,120,143],"deeply":[99],"examine":[100],"review":[102],"concept":[105],"challenges":[111],"it":[112],"faces":[113],"at":[114],"first.":[115],"second":[118],"phase,":[119],"mainly":[121],"address":[122],"research":[124],"gap":[125],"present":[132],"analysis":[134],"associated":[136],"last":[141],"section,":[142],"introduce":[144],"our":[145,186,200],"approach":[146],"aims":[148],"to:":[149],"(i)":[150],"capture":[151],"processes":[153],"penetration":[155],"attempts,":[156],"alterations":[157],"cyber":[159],"attacks;":[160],"(ii)":[161],"truck":[162],"malicious":[163],"behaviors":[164],"locate":[166],"their":[167],"sources;":[168],"(iii)":[170],"finally":[171],"setup":[172],"controls":[173],"repel":[175],"prevent":[177],"them.":[178],"To":[179],"illustrate":[180],"applicability":[182],"efficiency":[184],"solution,":[187],"We":[188],"refer":[189],"case":[192],"study":[194],"demonstrate":[196],"efficacy":[198],"detection":[201],"method,":[202],"using":[203],"different":[204],"machine":[205],"learning":[206],"algorithms":[207],"dataset":[210],"CICIDS2017.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
