{"id":"https://openalex.org/W4410357400","doi":"https://doi.org/10.1145/3672608.3707769","title":"Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection","display_name":"Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4410357400","doi":"https://doi.org/10.1145/3672608.3707769"},"language":"en","primary_location":{"id":"doi:10.1145/3672608.3707769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707769","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707769","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707769","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102942908","display_name":"Tanish Patel","orcid":"https://orcid.org/0009-0001-1381-2986"},"institutions":[{"id":"https://openalex.org/I33586908","display_name":"Pandit Deendayal Petroleum University","ror":"https://ror.org/02nsv5p42","country_code":"IN","type":"education","lineage":["https://openalex.org/I33586908"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Tanish Patel","raw_affiliation_strings":["Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I33586908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037977430","display_name":"Rutvij H. Jhaveri","orcid":"https://orcid.org/0000-0002-3285-7346"},"institutions":[{"id":"https://openalex.org/I33586908","display_name":"Pandit Deendayal Petroleum University","ror":"https://ror.org/02nsv5p42","country_code":"IN","type":"education","lineage":["https://openalex.org/I33586908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rutvij Jhaveri","raw_affiliation_strings":["Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I33586908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035962673","display_name":"Dhavalkumar Thakker","orcid":"https://orcid.org/0000-0003-4479-3500"},"institutions":[{"id":"https://openalex.org/I191240316","display_name":"University of Hull","ror":"https://ror.org/04nkhwh30","country_code":"GB","type":"education","lineage":["https://openalex.org/I191240316"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dhavalkumar Thakker","raw_affiliation_strings":["School of Computer Science, University of Hull, Hull, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Hull, Hull, United Kingdom","institution_ids":["https://openalex.org/I191240316"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021528887","display_name":"Saweta Verma","orcid":"https://orcid.org/0000-0001-5430-6687"},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandeep Verma","raw_affiliation_strings":["Dept. of Electronics and Communication Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronics and Communication Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, India","institution_ids":["https://openalex.org/I70971781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041132923","display_name":"Palash Ingle","orcid":"https://orcid.org/0000-0002-1118-1295"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Palash Ingle","raw_affiliation_strings":["Department of Computer and Information Security, Sejong University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Security, Sejong University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I28777354"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102942908"],"corresponding_institution_ids":["https://openalex.org/I33586908"],"apc_list":null,"apc_paid":null,"fwci":8.6094,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97132292,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2024","last_page":"2031"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.685248851776123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6450334191322327},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5888320803642273},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4227566719055176},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34398192167282104},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18345069885253906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685248851776123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6450334191322327},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5888320803642273},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4227566719055176},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34398192167282104},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18345069885253906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672608.3707769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707769","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707769","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3672608.3707769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672608.3707769","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672608.3707769","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410357400.pdf","grobid_xml":"https://content.openalex.org/works/W4410357400.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W3120353641","https://openalex.org/W4317207036","https://openalex.org/W4327734800","https://openalex.org/W4378365142","https://openalex.org/W4379382625","https://openalex.org/W4385834563","https://openalex.org/W4386896216","https://openalex.org/W4389459280","https://openalex.org/W4389462109","https://openalex.org/W4390238465","https://openalex.org/W4392782431","https://openalex.org/W4396574823","https://openalex.org/W4400409820","https://openalex.org/W4402318795"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"The":[0,47],"proliferation":[1],"of":[2,9,16,45,49,56,61,111,121],"IoV":[3,38,74,152],"technologies":[4],"has":[5,32],"revolutionized":[6],"the":[7,27,53,57,105,119,131,165],"use":[8],"transport":[10],"systems":[11],"to":[12,24,41,85,127,139],"a":[13,42,147],"great":[14],"level":[15],"improvement":[17],"in":[18,73,82,150,171],"safety":[19],"and":[20,22,59,69,93,124,133,142,169],"efficiency,":[21],"convenience":[23],"users.":[25],"On":[26],"other":[28],"hand,":[29],"increased":[30],"connectivity":[31],"also":[33,163],"brought":[34],"new":[35],"vulnerabilities,":[36],"making":[37],"networks":[39],"susceptible":[40],"wide":[43],"range":[44],"cyber-attacks.":[46],"contribution":[48],"this":[50],"paper":[51],"is":[52],"in-depth":[54],"study":[55],"development":[58],"evaluation":[60],"advanced":[62],"machine":[63],"learning":[64],"(ML)":[65],"models":[66,78,145],"that":[67],"detect":[68],"classify":[70],"network":[71],"anomalies":[72],"ecosystems.":[75],"Several":[76],"classification":[77,135],"have":[79],"been":[80],"studied":[81],"our":[83],"research":[84],"achieve":[86],"high":[87],"accuracy":[88],"for":[89,108],"discriminating":[90],"between":[91,167],"benign":[92],"malicious":[94],"traffic.":[95],"This":[96],"work":[97],"further":[98],"harnesses":[99],"Explainable":[100],"AI":[101],"(XAI)":[102],"methodologies":[103],"through":[104],"LIME":[106],"framework":[107],"enhanced":[109],"interpretability":[110],"models'":[112],"decision-making":[113],"processes.":[114],"Experimental":[115],"results":[116],"strongly":[117],"advocate":[118],"strength":[120],"Random":[122],"Forest":[123],"XGBoost,":[125],"proving":[126],"be":[128],"better":[129],"on":[130],"binary":[132],"multi-class":[134],"tasks,":[136],"respectively.":[137],"Due":[138],"resilience,":[140],"preciseness,":[141],"scalability":[143],"these":[144],"are":[146],"practical":[148],"choice":[149],"real-world":[151],"security":[153],"frameworks.":[154],"Explainability":[155],"integrated":[156],"not":[157],"only":[158],"strengthens":[159],"model":[160],"reliability":[161],"but":[162],"closes":[164],"gap":[166],"performance":[168],"interoperability":[170],"vehicular":[172],"networks.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
