{"id":"https://openalex.org/W4413026857","doi":"https://doi.org/10.32604/cmc.2025.067950","title":"Forensic Analysis of Cyberattacks in Electric Vehicle Charging Systems Using Host-Level Data","display_name":"Forensic Analysis of Cyberattacks in Electric Vehicle Charging Systems Using Host-Level Data","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413026857","doi":"https://doi.org/10.32604/cmc.2025.067950"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067950","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067950","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067950","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027575640","display_name":"Salam Al-E\u2019mari","orcid":"https://orcid.org/0000-0002-2134-4158"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Salam Al-E\u2019mari","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062565743","display_name":"Yousef Sanjalawe","orcid":"https://orcid.org/0000-0002-4442-1865"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yousef Sanjalawe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067126557","display_name":"Budoor Allehyani","orcid":"https://orcid.org/0009-0006-0424-6894"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Budoor Allehyani","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091777302","display_name":"Ghader Kurdi","orcid":"https://orcid.org/0000-0003-1745-5581"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ghader Kurdi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024473397","display_name":"Sharif Naser Makhadmeh","orcid":"https://orcid.org/0000-0002-2894-7998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sharif Makhadmeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064630000","display_name":"Ameera Jaradat","orcid":"https://orcid.org/0000-0002-4150-2360"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ameera Jaradat","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5117765460","display_name":"Duaa H. Hijazi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duaa Hijazi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5027575640"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29068516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"3289","last_page":"3320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10751","display_name":"Forensic and Genetic Research","score":0.9104999899864197,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.7903968095779419},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5836495161056519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4708784520626068},{"id":"https://openalex.org/keywords/electric-vehicle","display_name":"Electric vehicle","score":0.42320752143859863},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.1044725775718689},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0681489109992981}],"concepts":[{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.7903968095779419},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5836495161056519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4708784520626068},{"id":"https://openalex.org/C2776422217","wikidata":"https://www.wikidata.org/wiki/Q13629441","display_name":"Electric vehicle","level":3,"score":0.42320752143859863},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.1044725775718689},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0681489109992981},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067950","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067950","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067950","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067950","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2057652091","https://openalex.org/W2122646361","https://openalex.org/W2129905273","https://openalex.org/W2172241544","https://openalex.org/W2278186031","https://openalex.org/W2996791554","https://openalex.org/W3090046868","https://openalex.org/W3108634995","https://openalex.org/W3153165300","https://openalex.org/W3189306419","https://openalex.org/W4319795491","https://openalex.org/W4386608804","https://openalex.org/W4387108032","https://openalex.org/W4388764429","https://openalex.org/W4391514203","https://openalex.org/W4392405498","https://openalex.org/W4401198104","https://openalex.org/W4402304597","https://openalex.org/W4407642782","https://openalex.org/W4408155247","https://openalex.org/W4408798003","https://openalex.org/W4411341981"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Electric":[0],"Vehicle":[1],"Charging":[2],"Systems":[3],"(EVCS)":[4],"are":[5],"increasingly":[6],"vulnerable":[7],"to":[8,65],"cybersecurity":[9,116],"threats":[10],"as":[11,72],"they":[12],"integrate":[13],"deeply":[14],"into":[15,105],"smart":[16],"grids":[17],"and":[18,60,67,76,85,118],"Internet":[19],"of":[20,99],"Things":[21],"(IoT)":[22],"environments,":[23],"raising":[24],"significant":[25],"security":[26],"challenges.":[27],"Most":[28],"existing":[29,94],"research":[30],"primarily":[31],"emphasizes":[32],"network-level":[33],"anomaly":[34],"detection,":[35],"leaving":[36],"critical":[37],"vulnerabilities":[38],"at":[39],"the":[40,89],"host":[41],"level":[42],"underexplored.":[43],"This":[44],"study":[45],"introduces":[46],"a":[47],"novel":[48],"forensic":[49,83],"analysis":[50,84],"framework":[51,91],"leveraging":[52],"host-level":[53],"data,":[54],"including":[55],"system":[56],"logs,":[57],"kernel":[58],"events,":[59],"Hardware":[61],"Performance":[62],"Counters":[63],"(HPC),":[64],"detect":[66],"analyze":[68],"sophisticated":[69],"cyberattacks":[70],"such":[71],"cryptojacking,":[73],"Denial-of-Service":[74],"(DoS),":[75],"reconnaissance":[77],"activities":[78],"targeting":[79],"EVCS.":[80],"Using":[81],"comprehensive":[82],"machine":[86],"learning":[87],"models,":[88],"proposed":[90],"significantly":[92],"outperforms":[93],"methods,":[95],"achieving":[96],"an":[97],"accuracy":[98],"98.81%.":[100],"The":[101],"findings":[102],"offer":[103],"insights":[104],"distinct":[106],"behavioral":[107],"signatures":[108],"associated":[109],"with":[110],"specific":[111],"cyber":[112],"threats,":[113],"enabling":[114],"improved":[115],"strategies":[117],"actionable":[119],"recommendations":[120],"for":[121],"robust":[122],"EVCS":[123],"infrastructure":[124],"protection.":[125]},"counts_by_year":[],"updated_date":"2025-12-05T23:21:25.405358","created_date":"2025-10-10T00:00:00"}
