{"id":"https://openalex.org/W4396670787","doi":"https://doi.org/10.1109/tnsm.2024.3394842","title":"ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network","display_name":"ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4396670787","doi":"https://doi.org/10.1109/tnsm.2024.3394842"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3394842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3394842","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://wrap.warwick.ac.uk/id/eprint/185878/1/WRAP-ECF-IDS-enhanced-cuckoo-filter-based-intrusion-detection-system-in-vehicle-network-2024.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102929525","display_name":"Sifan Li","orcid":"https://orcid.org/0009-0005-9954-8627"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sifan Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006794082","display_name":"Yue Cao","orcid":"https://orcid.org/0000-0002-2098-7637"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Cao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047974993","display_name":"Hassan Jalil Hadi","orcid":"https://orcid.org/0000-0001-7746-344X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hassan Jalil Hadi","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100611635","display_name":"Feng Hao","orcid":"https://orcid.org/0000-0002-8664-5074"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Feng Hao","raw_affiliation_strings":["Department of Computer Science, University of Warwick, Warwick, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Warwick, U.K","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026922943","display_name":"Faisal Hussain","orcid":"https://orcid.org/0000-0001-9812-7488"},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Faisal Bashir Hussain","raw_affiliation_strings":["Department of Computer Science, Bahria University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101977687","display_name":"Luan Chen","orcid":"https://orcid.org/0000-0001-9635-066X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210142324","display_name":"CY Cergy Paris Universit\u00e9","ror":"https://ror.org/043htjv09","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210142324"]},{"id":"https://openalex.org/I86175216","display_name":"\u00c9cole Nationale Sup\u00e9rieure de l'\u00c9lectronique et de ses Applications","ror":"https://ror.org/03qeacd72","country_code":"FR","type":"education","lineage":["https://openalex.org/I86175216"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Luan Chen","raw_affiliation_strings":["ETIS UMR8051, ENSEA, CY Cergy Paris University, CNRS, Cergy, France"],"affiliations":[{"raw_affiliation_string":"ETIS UMR8051, ENSEA, CY Cergy Paris University, CNRS, Cergy, France","institution_ids":["https://openalex.org/I86175216","https://openalex.org/I4210142324","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102929525"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.6702,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8369022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3846","last_page":"3860"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8400592803955078},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8298529386520386},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.7478806972503662},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6198131442070007},{"id":"https://openalex.org/keywords/cuckoo","display_name":"Cuckoo","score":0.5589825510978699},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.48548582196235657},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.40839290618896484},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37078213691711426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3652802109718323},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.348190039396286},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1700209379196167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8400592803955078},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8298529386520386},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.7478806972503662},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6198131442070007},{"id":"https://openalex.org/C2776810535","wikidata":"https://www.wikidata.org/wiki/Q26381","display_name":"Cuckoo","level":2,"score":0.5589825510978699},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.48548582196235657},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40839290618896484},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37078213691711426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3652802109718323},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.348190039396286},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1700209379196167},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0},{"id":"https://openalex.org/C90856448","wikidata":"https://www.wikidata.org/wiki/Q431","display_name":"Zoology","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnsm.2024.3394842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3394842","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:185878","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TNSM.2024.3394842","pdf_url":"https://wrap.warwick.ac.uk/id/eprint/185878/1/WRAP-ECF-IDS-enhanced-cuckoo-filter-based-intrusion-detection-system-in-vehicle-network-2024.pdf","source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":{"id":"pmh:oai:wrap.warwick.ac.uk:185878","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TNSM.2024.3394842","pdf_url":"https://wrap.warwick.ac.uk/id/eprint/185878/1/WRAP-ECF-IDS-enhanced-cuckoo-filter-based-intrusion-detection-system-in-vehicle-network-2024.pdf","source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G579185416","display_name":null,"funder_award_id":"EP/T014784/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396670787.pdf","grobid_xml":"https://content.openalex.org/works/W4396670787.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1986760892","https://openalex.org/W2075453005","https://openalex.org/W2133854595","https://openalex.org/W2514817870","https://openalex.org/W2620604911","https://openalex.org/W2759891682","https://openalex.org/W2890419336","https://openalex.org/W2896457183","https://openalex.org/W2959120033","https://openalex.org/W2963719192","https://openalex.org/W2975262648","https://openalex.org/W2979202956","https://openalex.org/W2993447978","https://openalex.org/W2998230451","https://openalex.org/W3021269664","https://openalex.org/W3083938246","https://openalex.org/W3084020249","https://openalex.org/W3105105644","https://openalex.org/W3106212564","https://openalex.org/W3130982961","https://openalex.org/W3154414470","https://openalex.org/W3199978469","https://openalex.org/W3209098095","https://openalex.org/W4220775946","https://openalex.org/W4284966659","https://openalex.org/W4293731203","https://openalex.org/W4294860585","https://openalex.org/W4297911758","https://openalex.org/W4312648203","https://openalex.org/W4312667278","https://openalex.org/W4317600390","https://openalex.org/W4360764185","https://openalex.org/W4381163845","https://openalex.org/W4383503820","https://openalex.org/W4388188747","https://openalex.org/W4392122558","https://openalex.org/W6726101316","https://openalex.org/W6856375316"],"related_works":["https://openalex.org/W3183935101","https://openalex.org/W3004779303","https://openalex.org/W2765530022","https://openalex.org/W4309048563","https://openalex.org/W2755443890","https://openalex.org/W2980152930","https://openalex.org/W2780013245","https://openalex.org/W25690811","https://openalex.org/W164326178","https://openalex.org/W2607258344"],"abstract_inverted_index":{"With":[0],"the":[1,19,36,88,94,110,122,134,150,183],"rapid":[2],"advancement":[3],"of":[4,13,56,87],"vehicle":[5],"connectivity":[6],"and":[7,61,104,118,152,162,186],"intelligent":[8],"technologies,":[9],"an":[10,69,84,105],"increasing":[11],"number":[12],"vehicles":[14,24],"are":[15,25],"now":[16],"connected":[17,23],"to":[18,27,97,168,191],"Internet.":[20],"However,":[21],"these":[22,130],"vulnerable":[26],"malicious":[28],"attacks,":[29,52,60],"posing":[30],"serious":[31],"security":[32],"events.":[33],"In":[34,64],"particular,":[35],"in-vehicle":[37,78,179],"controller":[38],"area":[39],"network":[40,51],"(CAN)":[41],"bus":[42],"has":[43],"witnessed":[44],"a":[45,141],"rise":[46],"in":[47,172],"incidents":[48],"involving":[49],"various":[50],"such":[53],"as":[54],"denial":[55],"service":[57],"(DoS),":[58],"fuzzy":[59],"gear":[62],"attacks.":[63],"response,":[65],"this":[66],"paper":[67],"proposes":[68],"enhanced":[70,85],"cuckoo":[71,89,95],"filter-based":[72],"intrusion":[73,106],"detection":[74,157,163,188],"system":[75],"(ECF-IDS)":[76],"for":[77],"network.":[79],"The":[80,144],"ECF-IDS":[81,145,184],"builds":[82],"on":[83,109,182],"version":[86],"filter.":[90],"It":[91],"first":[92],"utilizes":[93],"filter":[96],"establish":[98],"two":[99,131],"lists":[100],"(a":[101],"normal":[102],"list":[103],"list)":[107],"based":[108],"labeled":[111],"dataset":[112],"using":[113,140,149],"Car":[114],"Hacking":[115],"Dataset":[116],"(CHD)":[117],"can-train-and-test":[119,153],"dataset.":[120],"Then,":[121],"input":[123],"CAN":[124],"traffic":[125,136],"is":[126,137,146],"sequentially":[127],"compared":[128,167],"with":[129],"lists,":[132],"where":[133],"conflicting":[135],"further":[138],"identified":[139],"BERT-based":[142],"model.":[143],"experimentally":[147],"validated":[148],"CHD":[151],"dataset,":[154],"demonstrating":[155],"higher":[156],"efficiency,":[158],"lower":[159],"resource":[160],"consumption,":[161],"success":[164],"exceeding":[165],"99%":[166],"other":[169],"algorithms":[170],"presented":[171],"previous":[173],"studies.":[174],"Furthermore,":[175],"we":[176],"conducted":[177],"real":[178],"environment":[180],"testing":[181],"model,":[185],"its":[187],"performance":[189],"proved":[190],"be":[192],"excellent.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
