{"id":"https://openalex.org/W4400978117","doi":"https://doi.org/10.1145/3664476.3671012","title":"Anomaly detection mechanisms for in-vehicle and V2X systems","display_name":"Anomaly detection mechanisms for in-vehicle and V2X systems","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400978117","doi":"https://doi.org/10.1145/3664476.3671012"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3671012","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3671012","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3671012","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076338496","display_name":"Alexios Lekidis","orcid":"https://orcid.org/0000-0002-8243-7075"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Alexios Lekidis","raw_affiliation_strings":["University of Thessaly, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Greece","institution_ids":["https://openalex.org/I145722265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5076338496"],"corresponding_institution_ids":["https://openalex.org/I145722265"],"apc_list":null,"apc_paid":null,"fwci":0.6659,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68845383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6323245167732239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5757161378860474},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4112265706062317},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2042878270149231}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6323245167732239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5757161378860474},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4112265706062317},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2042878270149231},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3671012","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3671012","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3671012","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3671012","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2011497607","https://openalex.org/W2014608904","https://openalex.org/W2325295752","https://openalex.org/W2588734850","https://openalex.org/W2959707152","https://openalex.org/W3017563551","https://openalex.org/W3033870338","https://openalex.org/W3094038710","https://openalex.org/W3131503087","https://openalex.org/W4292745594","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Modern":[0],"V2X":[1,50,86],"systems":[2],"have":[3],"an":[4,165],"increasing":[5],"number":[6],"of":[7,18,44,78,85,93,97,103,113,147],"interfaces":[8],"that":[9,38,172],"allow":[10],"remote":[11],"connectivity":[12],"but":[13],"also":[14],"include":[15],"the":[16,24,42,49,54,61,76,83,90,110,114,144,182,192],"risk":[17],"exposure":[19],"to":[20,64,177],"cyber":[21],"threats.":[22],"Hence,":[23],"attack":[25],"surface":[26],"for":[27,56,142],"such":[28,68,73],"threats":[29,69],"is":[30,162],"constantly":[31],"increasing,":[32],"and":[33,88,121,132,186],"combined":[34],"with":[35],"privacy":[36],"issues":[37],"may":[39],"arise":[40],"through":[41,164],"presence":[43],"sensitive":[45],"user":[46],"data":[47],"in":[48],"ecosystem,":[51],"this":[52],"necessitates":[53],"requirement":[55],"novel":[57,138],"security":[58,148],"mechanisms.":[59],"However,":[60],"existing":[62],"mechanisms":[63,149],"ensure":[65],"protection":[66],"against":[67],"face":[70],"major":[71],"hurdles,":[72,105],"as":[74,124,126],"1)":[75],"lack":[77],"in-vehicle":[79,116,158],"addressing":[80,143],"schemes,":[81],"2)":[82],"abundance":[84],"interfaces,":[87],"3)":[89],"manufacturer-specific":[91],"architecture":[92,117],"each":[94],"vehicle":[95,193],"comprised":[96],"various":[98],"heterogeneous":[99],"systems.":[100],"On":[101],"top":[102],"these":[104],"a":[106,137,153],"solution":[107,141,161],"should":[108],"satisfy":[109],"real-time":[111,157],"requirements":[112],"resource-constrained":[115],"by":[118,127,150,190],"remaining":[119],"lightweight":[120],"highly":[122],"reliable,":[123],"well":[125],"avoiding":[128],"false":[129],"positive":[130],"indications":[131],"alarms.":[133],"This":[134],"article":[135],"presents":[136],"anomaly":[139,174],"detection":[140,175],"main":[145],"challenges":[146],"simultaneously":[151],"keeping":[152],"minimal":[154],"impact":[155],"on":[156],"requirements.":[159],"The":[160],"demonstrated":[163],"Electric":[166],"Vehicle":[167],"(EV)":[168],"charging":[169,184],"hub":[170],"testbed":[171],"implements":[173],"schemes":[176],"detect":[178],"proof-of-concept":[179],"cyber-attacks":[180],"targeting":[181],"EV":[183],"profile":[185],"causing":[187],"cascading":[188],"effects":[189],"zeroing":[191],"speed.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
