{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:05:34Z","timestamp":1772643934946,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707769","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"2024-2031","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1381-2986","authenticated-orcid":false,"given":"Tanish","family":"Patel","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3285-7346","authenticated-orcid":false,"given":"Rutvij","family":"Jhaveri","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4479-3500","authenticated-orcid":false,"given":"Dhavalkumar","family":"Thakker","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Hull, Hull, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5430-6687","authenticated-orcid":false,"given":"Sandeep","family":"Verma","sequence":"additional","affiliation":[{"name":"Dept. of Electronics and Communication Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1118-1295","authenticated-orcid":false,"given":"Palash","family":"Ingle","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300171"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1515"},{"key":"e_1_3_2_1_3_1","volume-title":"Real-Time Threat Intelligence Integration for Cybersecurity in Autonomous Vehicles\u2014A Deep Learning Framework. Journal of Artificial Intelligence Research and Applications","author":"Ak\u0131n M","year":"2023","unstructured":"M Ak\u0131n. 2023. Real-Time Threat Intelligence Integration for Cybersecurity in Autonomous Vehicles\u2014A Deep Learning Framework. Journal of Artificial Intelligence Research and Applications (2023)."},{"key":"e_1_3_2_1_4_1","volume-title":"Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions. Sensors","author":"Alalwany E","year":"2024","unstructured":"E Alalwany and I Mahgoub. 2024. Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions. Sensors (2024)."},{"key":"e_1_3_2_1_5_1","volume-title":"Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, and Ala Al-Fuqaha.","author":"Almehdhar Mohammed","year":"2024","unstructured":"Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, and Ala Al-Fuqaha. 2024. Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open Journal of Vehicular Technology (2024)."},{"key":"e_1_3_2_1_6_1","volume-title":"Explainable AI enabled intrusion detection technique for secure cyber-physical systems. Applied Sciences","author":"Almuqren L","year":"2023","unstructured":"L Almuqren, MS Maashi, M Alamgeer, and H Mohsen. 2023. Explainable AI enabled intrusion detection technique for secure cyber-physical systems. Applied Sciences (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107667"},{"key":"e_1_3_2_1_8_1","first-page":"33","article-title":"Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation","volume":"4","author":"Asaju Babajide J","year":"2024","unstructured":"Babajide J Asaju. 2024. Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation. Journal of Computational Intelligence and Robotics 4, 1 (2024), 33\u201350.","journal-title":"Journal of Computational Intelligence and Robotics"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.120057"},{"key":"e_1_3_2_1_10_1","volume-title":"Cybersecurity threats mitigation in Internet of Vehicles communication system using reliable clustering and routing. Microprocessors and Microsystems","author":"Kadam MV","year":"2023","unstructured":"MV Kadam, HB Mahajan, NJ Uke, and PR Futane. 2023. Cybersecurity threats mitigation in Internet of Vehicles communication system using reliable clustering and routing. Microprocessors and Microsystems (2023)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3319"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.312"},{"key":"e_1_3_2_1_13_1","volume-title":"Reliability and security of CR-STAR-RISNOMA assisted IoT networks","author":"Li Xingwang","year":"2023","unstructured":"Xingwang Li, Junyao Zhang, Congzheng Han, Wanming Hao, Ming Zeng, Zhengyu Zhu, and Han Wang. 2023. Reliability and security of CR-STAR-RISNOMA assisted IoT networks. IEEE Internet of Things Journal (2023)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3050503"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"e_1_3_2_1_16_1","volume-title":"XAI-ADS: An explainable AI framework for enhancing anomaly detection in autonomous driving systems","author":"Nazat S","year":"2024","unstructured":"S Nazat, L Li, and M Abdallah. 2024. XAI-ADS: An explainable AI framework for enhancing anomaly detection in autonomous driving systems. IEEE Access (2024)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13031252"},{"key":"e_1_3_2_1_18_1","first-page":"238","article-title":"Explainable Reinforcement Learning Models for Adaptive Cyber Defense in Autonomous Vehicles","volume":"3","author":"P\u00e1ez Andr\u00e9s","year":"2023","unstructured":"Andr\u00e9s P\u00e1ez. 2023. Explainable Reinforcement Learning Models for Adaptive Cyber Defense in Autonomous Vehicles. Journal of Artificial Intelligence Research and Applications 3, 2 (2023), 238\u2013261.","journal-title":"Journal of Artificial Intelligence Research and Applications"},{"key":"e_1_3_2_1_19_1","first-page":"18","article-title":"Security Trends in Internet-of-things for Ambient Assistive Living","volume":"17","author":"Patel Ankit D","year":"2024","unstructured":"Ankit D Patel, Rutvij H Jhaveri, Kaushal A Shah, Ashish D Patel, Rajkumar S Rathore, Manish Paliwal, Kumar Abhishek, and Dhavalkumar Thakker. 2024. Security Trends in Internet-of-things for Ambient Assistive Living: A Review. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science) 17, 7 (2024), 18\u201346.","journal-title":"A Review. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science)"},{"key":"e_1_3_2_1_20_1","volume-title":"Demystifying Defects: Federated Learning and Explainable AI for Semiconductor Fault Detection","author":"Patel Tanish","year":"2024","unstructured":"Tanish Patel, Ramalingam Murugan, Gokul Yenduri, Rutvij Jhaveri, Hichem Snoussi, and Tarek Gaber. 2024. Demystifying Defects: Federated Learning and Explainable AI for Semiconductor Fault Detection. IEEE Access (2024)."},{"key":"e_1_3_2_1_21_1","volume-title":"Sonia Verma, Rohit Sharma, Ahmed Alkhayyat, and Sachin Kumar.","author":"Rani Preeti","year":"2023","unstructured":"Preeti Rani, Chandani Sharma, Janjhyam Venkata Naga Ramesh, Sonia Verma, Rohit Sharma, Ahmed Alkhayyat, and Sachin Kumar. 2023. Federated learning-based misbehaviour detection for the 5G-enabled internet of vehicles. IEEE Transactions on Consumer Electronics (2023)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3282740"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-70835-3"},{"key":"e_1_3_2_1_24_1","volume-title":"Blockchain intelligence for internet of vehicles: Challenges and solutions","author":"Wang X","year":"2023","unstructured":"X Wang, H Zhu, Z Ning, and L Guo. 2023. Blockchain intelligence for internet of vehicles: Challenges and solutions. IEEE Communications Surveys & Tutorials (2023)."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:32Z","timestamp":1750298252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":24,"alternative-id":["10.1145\/3672608.3707769","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707769","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}