{"id":"https://openalex.org/W4405270144","doi":"https://doi.org/10.1109/tccn.2024.3516052","title":"A Cloud Collaborative-Based Intrusion Detection and Prevention System for IVN","display_name":"A Cloud Collaborative-Based Intrusion Detection and Prevention System for IVN","publication_year":2024,"publication_date":"2024-12-11","ids":{"openalex":"https://openalex.org/W4405270144","doi":"https://doi.org/10.1109/tccn.2024.3516052"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2024.3516052","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2024.3516052","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080415718","display_name":"Sifan Li","orcid":"https://orcid.org/0000-0003-1624-0992"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sifan Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006794082","display_name":"Yue Cao","orcid":"https://orcid.org/0000-0002-2098-7637"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Cao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067582626","display_name":"Yu\u2019ang Zhang","orcid":"https://orcid.org/0000-0002-4177-4016"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu\u2019Ang Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025446896","display_name":"Tongxin Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongxin Liao","raw_affiliation_strings":["Hubei Key Laboratory of Smart Internet Technology, School of Electronic Information and Communication, Huazhong University of Science and Technology, Wuhan, China","School of Electronic Information and Communication, Hubei Key Laboratory of Smart Internet Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Smart Internet Technology, School of Electronic Information and Communication, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"School of Electronic Information and Communication, Hubei Key Laboratory of Smart Internet Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101649813","display_name":"Fei Yan","orcid":"https://orcid.org/0000-0003-0492-3278"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Yan","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101624825","display_name":"Hai Lin","orcid":"https://orcid.org/0000-0003-1495-7121"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Lin","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080415718"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.0912,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80335511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"11","issue":"4","first_page":"2768","last_page":"2785"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8145341873168945},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7053941488265991},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6833497285842896},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4878402054309845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3186911642551422},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10035887360572815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8145341873168945},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7053941488265991},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6833497285842896},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4878402054309845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3186911642551422},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10035887360572815}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2024.3516052","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2024.3516052","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1986760892","https://openalex.org/W2325060691","https://openalex.org/W2552217791","https://openalex.org/W2884737240","https://openalex.org/W2892564986","https://openalex.org/W2896457183","https://openalex.org/W2897929592","https://openalex.org/W2959120033","https://openalex.org/W2964262308","https://openalex.org/W2979202956","https://openalex.org/W2982902108","https://openalex.org/W2990167939","https://openalex.org/W2998230451","https://openalex.org/W3083938246","https://openalex.org/W3106212564","https://openalex.org/W3130982961","https://openalex.org/W3154414470","https://openalex.org/W3173906426","https://openalex.org/W3194413837","https://openalex.org/W3195279647","https://openalex.org/W3204527343","https://openalex.org/W3215723981","https://openalex.org/W4205625641","https://openalex.org/W4220775946","https://openalex.org/W4285146035","https://openalex.org/W4285274733","https://openalex.org/W4294860585","https://openalex.org/W4312648203","https://openalex.org/W4317600390","https://openalex.org/W4360764185","https://openalex.org/W4381163845","https://openalex.org/W4386951995","https://openalex.org/W4387675520","https://openalex.org/W4387757650","https://openalex.org/W4388188747","https://openalex.org/W4390970197","https://openalex.org/W4392173855","https://openalex.org/W4392667184","https://openalex.org/W4396670787","https://openalex.org/W4402158830","https://openalex.org/W6755207826","https://openalex.org/W7038617214"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W1513478798","https://openalex.org/W4300599821"],"abstract_inverted_index":{"With":[0],"the":[1,33,65,100,106,140,148,158,173,176,189,203],"increasing":[2],"intelligence":[3],"and":[4,49,80,123,153,182,195],"convenience":[5],"of":[6,160],"modern":[7],"vehicles,":[8],"Internet-of-Vehicle":[9],"(IoV)":[10],"technology":[11],"plays":[12],"a":[13,75,109],"pivotal":[14],"role":[15],"in":[16,157,199],"driving":[17],"these":[18,70],"advancements.":[19],"While":[20],"IoV":[21],"enhances":[22],"user":[23],"services,":[24],"it":[25],"also":[26],"introduces":[27],"security":[28],"threats,":[29],"particularly":[30],"intrusions":[31],"into":[32],"In-Vehicle":[34],"Network":[35,120],"(IVN).":[36],"Attackers":[37],"can":[38],"exploit":[39],"onboard":[40],"external":[41],"network":[42],"interfaces,":[43],"posing":[44],"risks":[45],"to":[46,144,172,185],"vehicle":[47],"safety":[48],"operation.":[50],"Besides,":[51],"deploying":[52],"an":[53],"Intrusion":[54,78],"Detection":[55,79],"System":[56,82],"(IDS)":[57],"on":[58,137,202],"vehicles":[59],"with":[60,95],"limited":[61],"computational":[62,66],"resources":[63],"exacerbates":[64],"burden.":[67],"To":[68],"address":[69],"challenges,":[71],"this":[72,85],"paper":[73],"proposes":[74],"Cloud":[76],"Collaborative-based":[77],"Prevention":[81],"(CC-IDPS).":[83],"Firstly,":[84],"study":[86],"analyzes":[87],"existing":[88],"in-vehicle":[89,133,145],"intrusion":[90],"detection":[91,180],"datasets":[92],"and,":[93],"combined":[94],"real":[96],"in-vehicle/simulation":[97],"data,":[98],"constructs":[99],"In-vehicle":[101],"Attack":[102],"Dataset":[103],"(IVAD).":[104],"Secondly,":[105],"CC-IDPS":[107,141,190],"employs":[108],"sliding":[110],"window":[111],"approach":[112],"for":[113,132],"feature":[114],"extraction":[115],"from":[116,128],"multiple":[117],"Controller":[118],"Area":[119],"(CAN)":[121],"IDs,":[122],"leverages":[124],"Bidirectional":[125],"Encoder":[126],"Representation":[127],"Transformers":[129],"(BERT)":[130],"models":[131,198],"traffic":[134,156],"classification.":[135],"Based":[136],"classification":[138],"results,":[139],"applies":[142],"treatments":[143],"traffic.":[146],"Subsequently,":[147],"proposed":[149],"Encode2ID":[150],"algorithm":[151],"encodes":[152],"stores":[154],"malicious":[155],"database":[159],"cloud,":[161],"facilitating":[162],"subsequent":[163],"model":[164,177],"training.":[165],"Experimental":[166],"results":[167],"demonstrate":[168],"that,":[169],"when":[170],"applied":[171],"IVAD":[174,204],"dataset,":[175],"exhibits":[178],"lower":[179],"accuracy":[181],"F1-score":[183],"compared":[184],"other":[186,192],"datasets.":[187],"Notably,":[188],"outperforms":[191],"machine":[193],"learning":[194,197],"deep":[196],"detecting":[200],"performance":[201],"dataset.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
