{"id":"https://openalex.org/W4402834708","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683076","title":"Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data","display_name":"Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4402834708","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683076"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2024-spring62846.2024.10683076","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683076","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100751344","display_name":"Feng Wang","orcid":"https://orcid.org/0000-0001-8265-3272"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Feng Wang","raw_affiliation_strings":["AT&#x0026;T Laboratories, Inc.,Middletown,NJ"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084188510","display_name":"Yaron Koral","orcid":"https://orcid.org/0000-0002-0752-2122"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaron Koral","raw_affiliation_strings":["AT&#x0026;T Laboratories, Inc.,Middletown,NJ"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072198077","display_name":"Kenichi Futamura","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kenichi Futamura","raw_affiliation_strings":["AT&#x0026;T Laboratories, Inc.,Middletown,NJ"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T Laboratories, Inc.,Middletown,NJ","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100751344"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17586043,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7465636134147644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6223194599151611},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5700667500495911},{"id":"https://openalex.org/keywords/ran","display_name":"Ran","score":0.44947168231010437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22758349776268005},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.19763657450675964}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7465636134147644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6223194599151611},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5700667500495911},{"id":"https://openalex.org/C160704184","wikidata":"https://www.wikidata.org/wiki/Q18031028","display_name":"Ran","level":2,"score":0.44947168231010437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22758349776268005},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19763657450675964}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2024-spring62846.2024.10683076","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683076","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W168460004","https://openalex.org/W1881619864","https://openalex.org/W1963914923","https://openalex.org/W1990649188","https://openalex.org/W2071849926","https://openalex.org/W2093972407","https://openalex.org/W2105907431","https://openalex.org/W2112303313","https://openalex.org/W2321707316","https://openalex.org/W2514396107","https://openalex.org/W2530179903","https://openalex.org/W2800299284","https://openalex.org/W2982407733","https://openalex.org/W3011157584","https://openalex.org/W3156245962","https://openalex.org/W4200152289","https://openalex.org/W6603557143","https://openalex.org/W6725823166"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W1766728438","https://openalex.org/W1668090144","https://openalex.org/W2504993638","https://openalex.org/W2083168956","https://openalex.org/W2980853820","https://openalex.org/W404373762","https://openalex.org/W2186004379","https://openalex.org/W2107427363"],"abstract_inverted_index":{"The":[0,71,143],"cybersecurity":[1,174],"of":[2,10,16,46,74,97,124,126,145,154,162],"connected":[3,116,127,155],"cars,":[4,128,156],"integral":[5],"to":[6,27,33],"the":[7,44,152,160,168],"broader":[8],"Internet":[9],"Things":[11],"(IoT)":[12],"landscape,":[13],"has":[14],"become":[15],"paramount":[17],"concern.":[18],"Cyber-attacks,":[19],"including":[20],"hijacking":[21,99],"and":[22,133,171],"spoofing,":[23],"pose":[24],"significant":[25],"threats":[26],"these":[28],"technological":[29],"advance-ments,":[30],"potentially":[31],"leading":[32],"unauthorized":[34],"control":[35],"over":[36],"vehicular":[37],"networks":[38],"or":[39,140],"creating":[40],"deceptive":[41],"identities.":[42],"Given":[43],"difficulty":[45],"deploying":[47],"comprehensive":[48],"defensive":[49],"logic":[50],"across":[51],"all":[52],"vehicles,":[53],"this":[54,75,146],"paper":[55,76],"presents":[56],"a":[57,78,94,98,131],"novel":[58],"approach":[59],"for":[60,136,167,176],"identifying":[61,137],"potential":[62,95,138],"attacks":[63],"through":[64],"Radio":[65],"Access":[66],"Network":[67],"(RAN)":[68],"event":[69],"monitoring.":[70],"major":[72],"contribution":[73],"is":[77,109],"location":[79,106],"anomaly":[80,107],"detection":[81,108],"module":[82],"that":[83,87],"identifies":[84],"aberrant":[85],"devices":[86],"appear":[88],"in":[89,111],"multiple":[90],"locations":[91],"simultaneously":[92],"-":[93],"indicator":[96],"attack.":[100],"We":[101],"demonstrate":[102],"how":[103],"RAN-event":[104],"based":[105],"effective":[110],"combating":[112],"malicious":[113,139],"activity":[114],"targeting":[115],"cars.":[117],"Using":[118],"RAN":[119],"data":[120],"generated":[121],"by":[122],"tens":[123],"millions":[125],"we":[129,157],"developed":[130],"fast":[132],"efficient":[134],"method":[135],"rogue":[141],"devices.":[142,178],"implications":[144],"research":[147],"are":[148],"far-reaching.":[149],"By":[150],"increasing":[151],"security":[153],"can":[158],"enhance":[159],"safety":[161],"users,":[163],"provide":[164],"robust":[165],"defenses":[166],"automotive":[169],"industry,":[170],"improve":[172],"overall":[173],"practices":[175],"IoT":[177]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
