{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:41:49Z","timestamp":1774446109762,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,19]]},"DOI":"10.1145\/3704522.3704534","type":"proceedings-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:29:51Z","timestamp":1735907391000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Explainable Deep Learning for Cyber Attack Detection in Electric Vehicle Charging Stations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3971-1005","authenticated-orcid":false,"given":"Md Mizanur","family":"Rahman","sequence":"first","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5417-4336","authenticated-orcid":false,"given":"Md Meheraz Hossain","family":"Chayan","sequence":"additional","affiliation":[{"name":"Brac University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5079-3722","authenticated-orcid":false,"given":"Khaleda","family":"Mehrin","sequence":"additional","affiliation":[{"name":"Bangladesh Bureau of Educational Information and Statistics, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0540-9233","authenticated-orcid":false,"given":"Afrin","family":"Sultana","sequence":"additional","affiliation":[{"name":"Bangladesh University of Professionals, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6392-2657","authenticated-orcid":false,"given":"Mosaab M.","family":"Hamed","sequence":"additional","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Tawfiq Aljohani and Abdulaziz Almutairi. 2024. Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations. Ain Shams Engineering Journal 15 7 (2024) 102860.","DOI":"10.1016\/j.asej.2024.102860"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Tawfiq\u00a0M Aljohani. 2024. Cyberattacks on Energy Infrastructures as Modern War Weapons\u2014Part I: Analysis and Motives. IEEE Technology and Society Magazine (2024).","DOI":"10.1109\/MTS.2024.3395688"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Alejandro\u00a0Barredo Arrieta Natalia D\u00edaz-Rodr\u00edguez Javier Del\u00a0Ser Adrien Bennetot Siham Tabik Alberto Barbado Salvador Garc\u00eda Sergio Gil-L\u00f3pez Daniel Molina Richard Benjamins et\u00a0al. 2020. Explainable Artificial Intelligence (XAI): Concepts taxonomies opportunities and challenges toward responsible AI. Information fusion 58 (2020) 82\u2013115.","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPIES48661.2020.9243152"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTLatinAmerica52371.2021.9543031"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Michelle Boucher. 2019. Transportation electrification and managing traffic congestion: The role of intelligent transportation systems. IEEE Electrification Magazine 7 3 (2019) 16\u201322.","DOI":"10.1109\/MELE.2019.2925730"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65172-4_11"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Lei Cui Youyang Qu Gang Xie Deze Zeng Ruidong Li Shigen Shen and Shui Yu. 2021. Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures. IEEE Transactions on Industrial Informatics 18 5 (2021) 3492\u20133500.","DOI":"10.1109\/TII.2021.3107783"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Zacharenia Garofalaki Dimitrios Kosmanos Sotiris Moschoyiannis Dimitrios Kallergis and Christos Douligeris. 2022. Electric Vehicle Charging: A Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP). IEEE Communications Surveys & Tutorials 24 3 (2022) 1504\u20131533. 10.1109\/COMST.2022.3184448 https:\/\/dl.acm.org\/doi\/10.1109\/COMST.2022.3184448","DOI":"10.1109\/COMST.2022.3184448"},{"key":"e_1_3_3_1_11_2","volume-title":"Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow","author":"G\u00e9ron Aur\u00e9lien","year":"2022","unstructured":"Aur\u00e9lien G\u00e9ron. 2022. Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Vehbi\u00a0C Gungor and Frank\u00a0C Lambert. 2006. A survey on communication networks for electric system automation. Computer Networks 50 7 (2006) 877\u2013897.","DOI":"10.1016\/j.comnet.2006.01.005"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"S Hakak TR Gadekallu SP Ramu PKR Maddikunta C de Alwis and M Liyanage. [n. d.]. Autonomous Vehicles in 5G and beyond: A Survey. arXiv 2022. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.10510 ([n. d.]).","DOI":"10.1016\/j.vehcom.2022.100551"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Mosaab\u00a0M. Hamed Hasan\u00a0H\u00fcseyin Turan and Sondoss Elsawah. 2024. Balancing supply diversification and environmental impacts: A system dynamics approach to de-risk rare earths supply chain. Resources Policy 92 (2024) 105038. 10.1016\/j.resourpol.2024.105038","DOI":"10.1016\/j.resourpol.2024.105038"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"S Hochreiter. 1997. Long Short-term Memory. Neural Computation MIT-Press (1997).","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Mohammad Hossin and Md\u00a0Nasir Sulaiman. 2015. A review on evaluation metrics for data classification evaluations. International journal of data mining & knowledge management process 5 2 (2015) 1.","DOI":"10.5121\/ijdkp.2015.5201"},{"key":"e_1_3_3_1_17_2","unstructured":"D Kavya. 2023. Optimizing performance: Selectkbest for efficient feature selection in machine learning."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Nikhil Ketkar Jojo Moolayil Nikhil Ketkar and Jojo Moolayil. 2021. Convolutional neural networks. Deep learning with Python: learn best practices of deep learning models with PyTorch (2021) 197\u2013242.","DOI":"10.1007\/978-1-4842-5364-9_6"},{"key":"e_1_3_3_1_19_2","unstructured":"Andrey Kolmogorov. 1933. Sulla determinazione empirica di una legge di distribuzione. Izvestiya Akademii Nauk SSSR Seriya Matematicheskaya 4 (1933) 83\u201399. English translation available in \"Selected Works of A.N. Kolmogorov\" Vol. I 1991 Kluwer Academic Publishers."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Yidong Li Li Zhang Zhuo Lv and Wei Wang. 2020. Detecting anomalies in intelligent vehicle charging and station power supply systems with multi-head attention models. IEEE Transactions on Intelligent Transportation Systems 22 1 (2020) 555\u2013564.","DOI":"10.1109\/TITS.2020.3018259"},{"key":"e_1_3_3_1_21_2","unstructured":"Scott\u00a0M. Lundberg and Su-In Lee. 2024. SHAP (SHapley Additive exPlanations). https:\/\/shap.readthedocs.io\/en\/latest\/ Accessed: 2024-10-01."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434760"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-323-96104-2.00002-6"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129693"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN61486.2024.10637543"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Md\u00a0Mizanur Rahman Faycal Bouhafs Sayed\u00a0Amir Hoseini and Frank den Hartog. 2024. UNSW HomeNet: A Network Traffic Flow Dataset for AI-Based Smart Home Device Classification. Available at SSRN (2024). 10.2139\/ssrn.4947730","DOI":"10.2139\/ssrn.4947730"},{"key":"e_1_3_3_1_27_2","unstructured":"scikit-learn developers. Accessed: May 17 2024. Scikit-learn.StandardScaler. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.StandardScaler.html"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_3_1_29_2","unstructured":"Nicolas-Alin Stoian. 2020. Machine learning for anomaly detection in iot networks: Malware analysis on the iot-23 data set. B.S. thesis. University of Twente."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Yinghui Zhang Jian Zou and Rui Guo. 2021. Efficient privacy-preserving authentication for V2G networks. Peer-to-Peer Networking and Applications 14 3 (2021) 1366\u20131378.","DOI":"10.1007\/s12083-020-01018-w"}],"event":{"name":"NSysS '24: 11th International Conference on Networking, Systems, and Security","location":"Khulna Karak Bangladesh","acronym":"NSysS '24"},"container-title":["Proceedings of the 11th International Conference on Networking, Systems, and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704522.3704534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:16Z","timestamp":1750295896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":29,"alternative-id":["10.1145\/3704522.3704534","10.1145\/3704522"],"URL":"https:\/\/doi.org\/10.1145\/3704522.3704534","relation":{},"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"2025-01-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}