{"id":"https://openalex.org/W2597594891","doi":"https://doi.org/10.1109/icce.2017.7889391","title":"An intrusion detection scheme for driverless vehicles based gyroscope sensor profiling","display_name":"An intrusion detection scheme for driverless vehicles based gyroscope sensor profiling","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2597594891","doi":"https://doi.org/10.1109/icce.2017.7889391","mag":"2597594891"},"language":"en","primary_location":{"id":"doi:10.1109/icce.2017.7889391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce.2017.7889391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022113291","display_name":"Khattab M. Ali Alheeti","orcid":"https://orcid.org/0000-0002-6393-7410"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Khattab M. Ali Alheeti","raw_affiliation_strings":["School of Computer Sciences and Electronic Engineering, University of Essex, Colchester, Essex, GB"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences and Electronic Engineering, University of Essex, Colchester, Essex, GB","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046365205","display_name":"Rabab Al-Zaidi","orcid":"https://orcid.org/0000-0002-2198-7794"},"institutions":[{"id":"https://openalex.org/I15873915","display_name":"Mustansiriyah University","ror":"https://ror.org/05s04wy35","country_code":"IQ","type":"education","lineage":["https://openalex.org/I15873915"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Rabab Al-Zaidi","raw_affiliation_strings":["AL-Mustansiriya University, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"AL-Mustansiriya University, Baghdad, Iraq","institution_ids":["https://openalex.org/I15873915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028364392","display_name":"J.V. Woods","orcid":"https://orcid.org/0000-0002-8945-1881"},"institutions":[{"id":"https://openalex.org/I27768575","display_name":"University of Anbar","ror":"https://ror.org/055a6gk50","country_code":"IQ","type":"education","lineage":["https://openalex.org/I27768575"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"John Woods","raw_affiliation_strings":["University of Anbar, College of Computer\u2013 Anbar, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Anbar, College of Computer\u2013 Anbar, Iraq","institution_ids":["https://openalex.org/I27768575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077992830","display_name":"Klaus D. McDonald-Maier","orcid":"https://orcid.org/0000-0002-6412-8519"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Klaus McDonald-Maier","raw_affiliation_strings":["School of Computer Sciences and Electronic Engineering, University of Essex, Colchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences and Electronic Engineering, University of Essex, Colchester, United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022113291"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":1.6066,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.84232903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"448","last_page":"449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.7160652875900269},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7124050855636597},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.712345540523529},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6774675250053406},{"id":"https://openalex.org/keywords/gyroscope","display_name":"Gyroscope","score":0.5883503556251526},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5753626823425293},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5453304052352905},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.49379977583885193},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46398499608039856},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4526805281639099},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.43051695823669434},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4158731698989868},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.19908544421195984},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16329985857009888},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13848620653152466}],"concepts":[{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.7160652875900269},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7124050855636597},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.712345540523529},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6774675250053406},{"id":"https://openalex.org/C158488048","wikidata":"https://www.wikidata.org/wiki/Q483400","display_name":"Gyroscope","level":2,"score":0.5883503556251526},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5753626823425293},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5453304052352905},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.49379977583885193},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46398499608039856},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4526805281639099},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.43051695823669434},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4158731698989868},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.19908544421195984},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16329985857009888},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13848620653152466},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icce.2017.7889391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce.2017.7889391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.essex.ac.uk:19920","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401236","display_name":"Open Access at Essex (University of Essex)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I110002522","host_organization_name":"University of Essex","host_organization_lineage":["https://openalex.org/I110002522"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8801075769","display_name":null,"funder_award_id":"EP/P016006/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1779915445","https://openalex.org/W1804936860","https://openalex.org/W1976010390","https://openalex.org/W2099005886","https://openalex.org/W2150778805","https://openalex.org/W2294896158","https://openalex.org/W2296099510"],"related_works":["https://openalex.org/W1889129279","https://openalex.org/W4387451989","https://openalex.org/W2532412374","https://openalex.org/W2063137106","https://openalex.org/W23275807","https://openalex.org/W2358715846","https://openalex.org/W2761234876","https://openalex.org/W2168042464","https://openalex.org/W4229455305","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Vehicular":[0],"ad-hoc":[1,74],"networks":[2,21,75],"of":[3,19,27,76],"self-driving":[4],"vehicles":[5,71,78],"are":[6],"potentially":[7],"exposed":[8],"to":[9],"both":[10],"internal":[11],"and":[12,17,68,79],"external":[13],"attacks.":[14,32,58],"The":[15,59],"privacy":[16],"security":[18,61],"these":[20],"is":[22,44],"paramount":[23],"for":[24],"effective":[25],"protection":[26],"communication":[28],"systems":[29],"from":[30],"possible":[31],"We":[33],"propose":[34],"an":[35],"intelligent":[36],"intrusion":[37],"detection":[38],"system":[39,62],"in":[40,66,72],"this":[41],"paper":[42],"that":[43],"based":[45],"on":[46],"Integrated":[47],"Circuit":[48],"Metrics":[49],"(ICMetrics),":[50],"which":[51],"has":[52],"significant":[53],"defensive":[54],"capability":[55],"against":[56],"unexpected":[57],"proposed":[60],"shows":[63],"good":[64],"performance":[65],"identifying":[67],"blocking":[69],"malicious":[70],"vehicular":[73],"driverless":[77,81],"semi":[80],"vehicles.":[82]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
