{"id":"https://openalex.org/W4320067144","doi":"https://doi.org/10.1109/vtc2022-fall57202.2022.10012711","title":"Toward a Multi-Layer Intrusion Response System for Connected Vehicles","display_name":"Toward a Multi-Layer Intrusion Response System for Connected Vehicles","publication_year":2022,"publication_date":"2022-09-01","ids":{"openalex":"https://openalex.org/W4320067144","doi":"https://doi.org/10.1109/vtc2022-fall57202.2022.10012711"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2022-fall57202.2022.10012711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2022-fall57202.2022.10012711","pdf_url":null,"source":{"id":"https://openalex.org/S4363607792","display_name":"2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001073593","display_name":"Jan Lauinger","orcid":"https://orcid.org/0000-0002-4917-1850"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jan Lauinger","raw_affiliation_strings":["Technical University of Munich,Munich,Germany","Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Munich,Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043815989","display_name":"Mohammad Hamad","orcid":"https://orcid.org/0000-0002-9049-7254"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mohammad Hamad","raw_affiliation_strings":["Technical University of Munich,Munich,Germany","Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Munich,Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080174920","display_name":"Sebastian Steinhorst","orcid":"https://orcid.org/0000-0002-4096-2584"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Steinhorst","raw_affiliation_strings":["Technical University of Munich,Munich,Germany","Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Munich,Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001073593"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":0.216,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41421023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7637403011322021},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7114510536193848},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5771255493164062},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5607842803001404},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5556554198265076},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5346137285232544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4396817982196808},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.43426215648651123},{"id":"https://openalex.org/keywords/response-time","display_name":"Response time","score":0.4311928153038025},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38956308364868164},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3696783185005188},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34747183322906494},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34690356254577637},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1760672926902771}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7637403011322021},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7114510536193848},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5771255493164062},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5607842803001404},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5556554198265076},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5346137285232544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4396817982196808},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.43426215648651123},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.4311928153038025},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38956308364868164},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3696783185005188},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34747183322906494},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34690356254577637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1760672926902771},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2022-fall57202.2022.10012711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2022-fall57202.2022.10012711","pdf_url":null,"source":{"id":"https://openalex.org/S4363607792","display_name":"2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1534113974","https://openalex.org/W2136375251","https://openalex.org/W2145223243","https://openalex.org/W2156352116","https://openalex.org/W2379726672","https://openalex.org/W3026891006","https://openalex.org/W4289541177","https://openalex.org/W6762907714"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W1513478798","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1],"are":[2],"increasingly":[3],"targeting":[4],"connected":[5],"vehicles.":[6],"Due":[7],"to":[8,17,19,34],"this,":[9],"Intrusion":[10],"Response":[11],"System":[12],"(IRS)":[13],"is":[14],"becoming":[15],"necessary":[16],"respond":[18],"unpreventable":[20],"attacks.":[21],"This":[22],"paper":[23],"proposes":[24],"a":[25],"multi-layer":[26],"IRS":[27,48,55],"prototype":[28,51],"that":[29],"incorporates":[30],"distributed":[31],"process":[32],"management":[33],"support":[35],"continuous":[36],"control":[37],"and":[38],"monitoring":[39],"of":[40,47],"incident":[41],"responses.":[42],"Based":[43],"on":[44],"our":[45,50],"analysis":[46],"taxonomies,":[49],"respects":[52],"the":[53],"latest":[54],"system":[56],"requirements.":[57]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
