{"id":"https://openalex.org/W7153429673","doi":"https://doi.org/10.1145/3779657.3779683","title":"Strengthening Resilience in DriveCare: A Thorough Assessment of Security Posture","display_name":"Strengthening Resilience in DriveCare: A Thorough Assessment of Security Posture","publication_year":2025,"publication_date":"2025-10-24","ids":{"openalex":"https://openalex.org/W7153429673","doi":"https://doi.org/10.1145/3779657.3779683"},"language":null,"primary_location":{"id":"doi:10.1145/3779657.3779683","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779657.3779683","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 7th World Symposium on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3779657.3779683","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133401596","display_name":"William P. Rey","orcid":"https://orcid.org/0000-0002-1345-2335"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"William P Rey","raw_affiliation_strings":["Mapua University, School of IT, Makati, Philippines"],"affiliations":[{"raw_affiliation_string":"Mapua University, School of IT, Makati, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093719241","display_name":"Alberto Villaluz","orcid":"https://orcid.org/0009-0002-6522-1050"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Alberto C. Villaluz","raw_affiliation_strings":["Mapua University, School of IT, Makati, Philippines"],"affiliations":[{"raw_affiliation_string":"Mapua University, School of IT, Makati, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5119009014","display_name":"Robert M. Dadigan","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Robert M. Dadigan","raw_affiliation_strings":["Mapua University, School of IT, Makati, Philippines"],"affiliations":[{"raw_affiliation_string":"Mapua University, School of IT, Makati, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5133401596"],"corresponding_institution_ids":["https://openalex.org/I137967721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74937163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"171","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7297999858856201,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7297999858856201,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.023900000378489494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7134000062942505},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.429500013589859},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3668000102043152},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3538999855518341},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.3508000075817108},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.3465999960899353},{"id":"https://openalex.org/keywords/foundation","display_name":"Foundation (evidence)","score":0.3366999924182892},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3050999939441681}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7134000062942505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6011999845504761},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4973999857902527},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.429500013589859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42879998683929443},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39820000529289246},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3765999972820282},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3668000102043152},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3538999855518341},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.3508000075817108},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3495999872684479},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3465999960899353},{"id":"https://openalex.org/C2780966255","wikidata":"https://www.wikidata.org/wiki/Q5474306","display_name":"Foundation (evidence)","level":2,"score":0.3366999924182892},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3012000024318695},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2913999855518341},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.29089999198913574},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.27059999108314514},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2565000057220459},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2547000050544739},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3779657.3779683","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779657.3779683","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 7th World Symposium on Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3779657.3779683","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779657.3779683","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 7th World Symposium on Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6379700899124146,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2023396558","https://openalex.org/W2537000533","https://openalex.org/W2979496624","https://openalex.org/W2990511181","https://openalex.org/W4311593273","https://openalex.org/W4318479589","https://openalex.org/W4327778747","https://openalex.org/W4385679575","https://openalex.org/W4387713320","https://openalex.org/W4402305435"],"related_works":[],"abstract_inverted_index":{"DriveCare":[0,23],"is":[1],"a":[2,38,60,71,97,120],"mobile":[3,144],"application":[4],"designed":[5],"to":[6,51,67,95,119],"streamline":[7],"automotive":[8],"services":[9],"such":[10],"as":[11],"diagnostics,":[12],"maintenance":[13],"scheduling,":[14],"and":[15,28,49,70,104,131],"service":[16],"provider":[17],"access.":[18],"The":[19,57],"rapid":[20],"evolution":[21],"of":[22,100,123,126,140],"introduces":[24],"both":[25],"significant":[26],"opportunities":[27],"challenges":[29],"for":[30,82,108,135],"ensuring":[31],"robust":[32],"security":[33,55,102,128,138],"measures.":[34],"This":[35,116],"study":[36,93],"employs":[37],"comprehensive":[39],"evaluation":[40],"strategy,":[41],"integrating":[42],"assessments":[43],"from":[44],"Qualys":[45],"SSL":[46],"Labs,":[47],"CryptCheck,":[48],"ImmuniWeb":[50],"analyze":[52],"DriveCare's":[53,101],"current":[54],"posture.":[56],"findings":[58],"reveal":[59],"strong":[61],"foundation":[62],"in":[63,85,142],"cryptographic":[64],"practices,":[65],"adherence":[66],"industry":[68],"standards,":[69],"clean":[72],"online":[73],"presence.":[74],"However,":[75],"the":[76,124,137,143],"analysis":[77],"also":[78],"identifies":[79],"specific":[80],"areas":[81],"improvement,":[83],"particularly":[84],"SSL/TLS":[86],"configuration.":[87],"By":[88],"synthesizing":[89],"these":[90],"findings,":[91],"this":[92],"aims":[94],"provide":[96],"holistic":[98],"view":[99],"landscape":[103],"offer":[105],"actionable":[106],"insights":[107],"enhancing":[109],"its":[110],"resilience":[111],"against":[112],"emerging":[113],"cybersecurity":[114],"threats.":[115],"research":[117],"contributes":[118],"deeper":[121],"understanding":[122],"effectiveness":[125],"various":[127],"assessment":[129],"tools":[130],"offers":[132],"valuable":[133],"recommendations":[134],"strengthening":[136],"posture":[139],"app":[141],"sector.":[145]},"counts_by_year":[],"updated_date":"2026-04-12T06:10:36.643156","created_date":"2026-04-12T00:00:00"}
