{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:31:42Z","timestamp":1773793902695,"version":"3.50.1"},"reference-count":70,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T00:00:00Z","timestamp":1766361600000},"content-version":"vor","delay-in-days":355,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Electric mobility offers promising benefits in sustainability and efficiency but also presents significant cybersecurity challenges that threaten the integrity of electric vehicles (EVs), charging infrastructure, and their communication systems. This article reviews the main threats, vulnerabilities, and existing mitigation strategies, identifying critical weaknesses in communication protocols, insufficient protection of charging stations, and limited onboard security. Notably, protocols such as CAN bus, OCPP, and ISO 15118 dominate current implementations; however, many of these protocols lack comprehensive protection mechanisms. Among the most frequent attacks are tampering, denial\u2010of\u2010service (DoS), and man\u2010in\u2010the\u2010middle attacks, which often target communication systems and charging points\u2014the most vulnerable elements in the ecosystem. The review also highlights underexplored but critical issues, including the low adoption of protocols such as ISO 26262 and IEC 61850, the security of V2X communications, and the protection of personal data generated by EVs. The article makes a main contribution by proposing a cybersecurity reference architecture and a strategic research roadmap to enhance resilience in electric mobility systems. These tools aim to address current gaps, promote the development of secure and adaptive communication frameworks, and support both academic research and industrial implementation in the transition to intelligent and connected mobility.<\/jats:p>","DOI":"10.1155\/jece\/5770202","type":"journal-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:09:01Z","timestamp":1766426941000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing the EV Charging Ecosystem: Protocol\u2010Level Vulnerabilities, Defenses, and a Research Roadmap"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-3499","authenticated-orcid":false,"given":"Miguel","family":"Aybar-Mej\u00eda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2574-5090","authenticated-orcid":false,"given":"Samil","family":"Cuevas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2240-8156","authenticated-orcid":false,"given":"Hip\u00f3lito","family":"Encarnaci\u00f3n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7002-9882","authenticated-orcid":false,"given":"Larimar","family":"Abel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9308-3973","authenticated-orcid":false,"given":"Jarlen","family":"Pichardo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0247-6137","authenticated-orcid":false,"given":"Kasumi","family":"Yasuoka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4255-3450","authenticated-orcid":false,"given":"Deyslen","family":"Mariano-Hernandez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6538-4728","authenticated-orcid":false,"given":"Armando J.","family":"Taveras-Cruz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8860-9085","authenticated-orcid":false,"given":"Giuseppe","family":"Sbriz-Zeitun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8859-7336","authenticated-orcid":false,"given":"Fabio Andrade","family":"Rengifo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9117-1689","authenticated-orcid":false,"given":"Jes\u00fas De la Casa","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,12,22]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.trd.2020.102249"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3267164"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041074"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/est2.115"},{"key":"e_1_2_10_5_2","volume-title":"Electric Vehicle Smart Grid Integration: Load Modeling, Scheduling, and Cyber Security","author":"Chung Y. W.","year":"2020"},{"key":"e_1_2_10_6_2","unstructured":"SecurityL. T. K. New Vehicle Security Research by Keenlab: Experimental Security Assessment of BMW Cars 2018."},{"key":"e_1_2_10_7_2","article-title":"Hackers Remotely Steer Tesla Model S Using Autopilot System","author":"Montalbano E.","year":"2019","journal-title":"The Security Ledger"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.DT.2024.06.009"},{"key":"e_1_2_10_9_2","doi-asserted-by":"crossref","unstructured":"BommenahalliR. Cybersecurity Challenges in the Electric Vehicle Industry: a Technical Overview Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 11 no. 1 1033\u20131041 https:\/\/doi.org\/10.32628\/CSEIT251112103.","DOI":"10.32628\/CSEIT251112103"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23156716"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2025.126364"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1787\/3a394362-en"},{"key":"e_1_2_10_14_2","article-title":"Connected Car Cybersecurity in the Era of New Regulation","author":"Deichmann J.","journal-title":"McKinsey"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"GirdharM. HongJ. LeeH. andSongT. J. Hidden Markov Models-Based Anomaly Correlations for the Cyber-Physical Security of EV Charging Stations 13 IEEE Transactions on Smart Grid Sept. 2022 no. 5 3903\u20133914 https:\/\/doi.org\/10.1109\/TSG.2021.3122106.","DOI":"10.1109\/TSG.2021.3122106"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"BakerD. Z. LiuH. andRobertsC. Ensuring Flexibility and Security in SDN-Based Spacecraft Communication Networks Through Risk Assessment 2019 IEEE International Symposium on Technologies for Homeland Security (HST) November. 2019 Institute of Electrical and Electronics Engineers (IEEE) 1\u20136 https:\/\/doi.org\/10.1109\/HST47167.2019.9032949.","DOI":"10.1109\/HST47167.2019.9032949"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"ThirietJ.-M.andMocanuS. A Course in Cyber-Security With Orientations Towards Cyber-Physical Systems 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE) Sept. 2019 IEEE 1\u20134 https:\/\/doi.org\/10.1109\/EAEEIE46886.2019.9000419.","DOI":"10.1109\/EAEEIE46886.2019.9000419"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130495"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"Arabia-ObedozaM. R. RodriguezG. JohnstonA. SalahdineF. andKaabouchN. Social Engineering Attacks A Reconnaissance Synthesis Analysis 2020 11th IEEE Annual Ubiquitous Computing Electronics & Mobile Communication Conference (UEMCON) Oct. 2020 0843\u20130848 https:\/\/doi.org\/10.1109\/UEMCON51285.2020.9298100.","DOI":"10.1109\/UEMCON51285.2020.9298100"},{"key":"e_1_2_10_20_2","doi-asserted-by":"crossref","unstructured":"ZelleD. RiekeR. PlappertC. KrausC. LevshunD. andChechulinA. SEPAD \u2013 Security Evaluation Platform for Autonomous Driving 2020 28th Euromicro International Conference on Parallel Distributed and Network-Based Processing (PDP) Mar. 2020 413\u2013420 https:\/\/doi.org\/10.1109\/PDP50117.2020.00070.","DOI":"10.1109\/PDP50117.2020.00070"},{"key":"e_1_2_10_21_2","unstructured":"Tencent Keen Security Lab Exploiting Wi-Fi Stack on Tesla Model S 2020."},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1049\/gtd2.12275"},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"KhalidA. SundararajanA. HernandezA. andSarwatA. I. FACTS Approach to Address Cybersecurity Issues in Electric Vehicle Battery Systems 2019 IEEE Technology & Engineering Management Conference (TEMSCON) 2019 IEEE 1\u20136 https:\/\/doi.org\/10.1109\/TEMSCON.2019.8813669 2-s2.0-85070812042.","DOI":"10.1109\/TEMSCON.2019.8813669"},{"key":"e_1_2_10_24_2","unstructured":"Tencent Keen Security Lab Tencent Keen Security Lab: Experimental Security Assessment on Lexus Cars 2020."},{"key":"e_1_2_10_25_2","unstructured":"Tencent Keen Security Lab Tencent Security Keen Lab: Experimental Security Assessment of Mercedes-Benz Cars 2021."},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-020-0103-1"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"MultinM. ISO 15118 as the Enabler of vehicle-to-grid Applications 2018 International Conference of Electrical and Electronic Technologies for Automotive 2018 IEEE 1\u20136 https:\/\/doi.org\/10.23919\/EETA.2018.8493213 2-s2.0-85056827725.","DOI":"10.23919\/EETA.2018.8493213"},{"key":"e_1_2_10_28_2","volume-title":"I. E. C, \u201cIEC 61851-1:2017\/COR1:2023","year":"2023"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3007320"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031182"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"GarofalakiZ. KosmanosD. MoschoyiannisS. KallergisD. andDouligerisC. Electric Vehicle Charging: A Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP) 24 IEEE Communications Surveys & Tutorials 2022 no. 3 1504\u20131533 https:\/\/doi.org\/10.1109\/COMST.2022.3184448.","DOI":"10.1109\/COMST.2022.3184448"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"GandhiK.andMorsiW. G. Impact of the Open Charge Point Protocol Between the Electric Vehicle and the Fast Charging Station on the Cybersecurity of the Smart Grid 2022 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) Sept. 2022 235\u2013240 https:\/\/doi.org\/10.1109\/CCECE49351.2022.9918406.","DOI":"10.1109\/CCECE49351.2022.9918406"},{"key":"e_1_2_10_33_2","doi-asserted-by":"crossref","unstructured":"MattepuS. Y. RichterM. andBalischewskiS. OCSS: An Application to Simulate Multiple Charging Stations Which Uses an Open Charge Point Protocol for Communication 2022 IEEE 13th International Symposium on Power Electronics for Distributed Generation Systems (PEDG) June 2022 1\u20135 https:\/\/doi.org\/10.1109\/PEDG54999.2022.9923317.","DOI":"10.1109\/PEDG54999.2022.9923317"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","unstructured":"DevendraD. MalkurthiS. NavnitA. andHussainA. M. Compact Electric Vehicle Charging Station Using Open Charge Point Protocol (OCPP) for E-Scooters 2021 International Conference on Sustainable Energy and Future Electric Transportation (SEFET) Jan. 2021 1\u20135 https:\/\/doi.org\/10.1109\/SeFet48154.2021.9375812.","DOI":"10.1109\/SeFet48154.2021.9375812"},{"key":"e_1_2_10_35_2","doi-asserted-by":"crossref","unstructured":"DevendraD. ManteS. NiteeshD. andHussainA. M. Electric Vehicle Charging Station Using Open Charge Point Protocol (OCPP) and oneM2M Platform for Enhanced Functionality TENCON 2021 2021 IEEE Region 10 Conference (TENCON) Dec. 2021 01\u201305 https:\/\/doi.org\/10.1109\/TENCON54134.2021.9707311.","DOI":"10.1109\/TENCON54134.2021.9707311"},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","unstructured":"OrcioniS. BuccoliniL. RicciA. andContiM. Electric Vehicles Charging Reservation Based on OCPP 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC\/I&CPS Europe) June 2018 1\u20136 https:\/\/doi.org\/10.1109\/EEEIC.2018.8494366 2-s2.0-85056535399.","DOI":"10.1109\/EEEIC.2018.8494366"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"GuptaR. NawareV. VattemA. andHussainA. M. A Wi-SUN Network-Based Electric Vehicle Charging Station Using Open Charge Point Protocol (OCPP) and oneM2M Platform 2024 IEEE Applied Sensing Conference (APSCON) Jan. 2024 1\u20134 https:\/\/doi.org\/10.1109\/APSCON60364.2024.10465759.","DOI":"10.1109\/APSCON60364.2024.10465759"},{"key":"e_1_2_10_38_2","doi-asserted-by":"crossref","unstructured":"FauziahK. AstrianiY. RenataD. A.et al. Design of AC Electric Vehicle Supply Equipment Based on Safety Standard 2021 3rd International Conference on High Voltage Engineering and Power Systems (ICHVEPS) Oct. 2021 425\u2013430 https:\/\/doi.org\/10.1109\/ICHVEPS53178.2021.9600963.","DOI":"10.1109\/ICHVEPS53178.2021.9600963"},{"key":"e_1_2_10_39_2","unstructured":"MetereR. PourmirzaZ. WalkerS. andNeaimehM. An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure 2022 http:\/\/arxiv.org\/abs\/2209.07842."},{"key":"e_1_2_10_40_2","doi-asserted-by":"crossref","unstructured":"BelkaaloulA.andBensaberB. A. Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks 2021 IEEE Symposium on Computers and Communications (ISCC) September 2021 Institute of Electrical and Electronics Engineers (IEEE) 1\u20135 https:\/\/doi.org\/10.1109\/ISCC53001.2021.9631258.","DOI":"10.1109\/ISCC53001.2021.9631258"},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"BerradaA. AnnenF. GurckeM. andHaubrockJ. Integrating Electric Vehicle Communication in Smart Grids 2021 IEEE Madrid PowerTech June 2021 Institute of Electrical and Electronics Engineers (IEEE) 1\u20135 https:\/\/doi.org\/10.1109\/PowerTech46648.2021.9494958.","DOI":"10.1109\/PowerTech46648.2021.9494958"},{"key":"e_1_2_10_42_2","doi-asserted-by":"crossref","unstructured":"IEEE Standard for Smart Energy Profile Application Protocol IEEE Std 20305-2018 Revis. IEEE Std 20305-2013 December 2018 Institute of Electrical and Electronics Engineers (IEEE) 1\u2013361 https:\/\/doi.org\/10.1109\/IEEESTD.2018.8608044.","DOI":"10.1109\/IEEESTD.2018.8608044"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"SangeethaR. G. HemanthC. andMaratiN. K. Remote Electric Vehicle Battery Monitoring & Life Cycle Management System 2022 IEEE 2nd International Conference on Sustainable Energy and Future Electric Transportation (SeFeT) Aug. 2022 1\u20135 https:\/\/doi.org\/10.1109\/SeFeT55524.2022.9909384.","DOI":"10.1109\/SeFeT55524.2022.9909384"},{"key":"e_1_2_10_44_2","doi-asserted-by":"crossref","unstructured":"KulkarniG. A.andJoshiR. D. Electric Vehicle Charging Station Integration With IOT Enabled Device 2021 10th International Conference on Internet of Everything Microwave Engineering Communication and Networks (IEMECON) Dec. 2021 IEEE 01\u201306 https:\/\/doi.org\/10.1109\/IEMECON53809.2021.9689147.","DOI":"10.1109\/IEMECON53809.2021.9689147"},{"key":"e_1_2_10_45_2","doi-asserted-by":"crossref","unstructured":"HaneemF. KamaN. AdamR. M. BasriS. RusliH. M. andSarkanH. M. Data Exchange Interoperability Protocol for Electric Vehicle Charging Systems Infrastructure IEEE EUROCON 2023 20th International Conference on Smart Technologies July 2023 193\u2013198 https:\/\/doi.org\/10.1109\/EUROCON56442.2023.10198979.","DOI":"10.1109\/EUROCON56442.2023.10198979"},{"key":"e_1_2_10_46_2","doi-asserted-by":"crossref","unstructured":"ChaudhariA. ShegokarS. ShindeG. andShimpleS. Real Time Implementation of OCPP Communication Protocol for Electric Vehicle Supply Equipment 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) Mar. 2023 943\u2013948 https:\/\/doi.org\/10.1109\/ICSCDS56580.2023.10105100.","DOI":"10.1109\/ICSCDS56580.2023.10105100"},{"key":"e_1_2_10_47_2","doi-asserted-by":"crossref","unstructured":"ParchomiukM. MoradewiczA. andGawi\u0144skiH. An Overview of Electric Vehicles Fast Charging Infrastructure 2019 Progress in Applied Electrical Engineering (PAEE) June 2019 Institute of Electrical and Electronics Engineers (IEEE) 1\u20135 https:\/\/doi.org\/10.1109\/PAEE.2019.8788983 2-s2.0-85071340153.","DOI":"10.1109\/PAEE.2019.8788983"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TTE.2023.3309505"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0342-y"},{"key":"e_1_2_10_50_2","doi-asserted-by":"crossref","unstructured":"Riza MargowadiY. AjiP.et al. A Design of Smart Charging Architecture for Battery Electric Vehicles 2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE) October 2023 Institute of Electrical and Electronics Engineers (IEEE) 1\u20135 https:\/\/doi.org\/10.1109\/ISGTEUROPE56780.2023.10408308.","DOI":"10.1109\/ISGTEUROPE56780.2023.10408308"},{"key":"e_1_2_10_51_2","doi-asserted-by":"crossref","unstructured":"BasnetM.andAliM. H. WCGAN-based Cyber-Attacks Detection System in the EV Charging Infrastructure 2022 4th International Conference on Smart Power & Internet Energy Systems (SPIES) Dec. 2022 1761\u20131766 https:\/\/doi.org\/10.1109\/SPIES55999.2022.10082342.","DOI":"10.1109\/SPIES55999.2022.10082342"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3104388"},{"key":"e_1_2_10_53_2","doi-asserted-by":"crossref","unstructured":"LiuH. ZhangY. andYangT. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing 32 IEEE Network May 2018 no. 3 78\u201383 https:\/\/doi.org\/10.1109\/MNET.2018.1700344 2-s2.0-85048334036.","DOI":"10.1109\/MNET.2018.1700344"},{"key":"e_1_2_10_54_2","doi-asserted-by":"crossref","unstructured":"VaidyaB.andMouftahH. T. Multimodal and multi-pass Authentication Mechanisms for Electric Vehicle Charging Networks 2020 International Wireless Communications and Mobile Computing (IWCMC) 2020 Institute of Electrical and Electronics Engineers (IEEE) 371\u2013376 https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148231.","DOI":"10.1109\/IWCMC48107.2020.9148231"},{"key":"e_1_2_10_55_2","volume-title":"Is Your Electric Vehicle Plotting Against You?: An Investigation of the ISO 15118 Standard and Current Security Implementations","author":"Berg A.","year":"2021"},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010043"},{"key":"e_1_2_10_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812303"},{"key":"e_1_2_10_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-025-01055-7"},{"key":"e_1_2_10_59_2","doi-asserted-by":"publisher","DOI":"10.3390\/wevj15090392"},{"key":"e_1_2_10_60_2","doi-asserted-by":"publisher","DOI":"10.3390\/s24051515"},{"key":"e_1_2_10_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijft.2022.100134"},{"key":"e_1_2_10_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97925-0_43"},{"key":"e_1_2_10_63_2","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-022-00190-y"},{"key":"e_1_2_10_64_2","doi-asserted-by":"crossref","unstructured":"ConstantinidesC. ShiaelesS. GhitaB. andKolokotronisN. A Novel Online Incremental Learning Intrusion Prevention System 2019 10th IFIP International Conference on New Technologies Mobility and Security (NTMS) Proc. Workshop 2019 https:\/\/doi.org\/10.1109\/NTMS.2019.8763842 2-s2.0-85070374469.","DOI":"10.1109\/NTMS.2019.8763842"},{"key":"e_1_2_10_65_2","doi-asserted-by":"crossref","unstructured":"BasnetM.andAliM. H. Deep Learning-Based Intrusion Detection System for Electric Vehicle Charging Station 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES) 2020 IEEE 408\u2013413 https:\/\/doi.org\/10.1109\/SPIES48661.2020.9243152.","DOI":"10.1109\/SPIES48661.2020.9243152"},{"key":"e_1_2_10_66_2","doi-asserted-by":"crossref","unstructured":"SinghN.andAgarwalR. Intrusion Detection System for Smart Vehicles Using Machine Learning Algorithms 2023 International Conference on Communication Security and Artificial Intelligence (ICCSAI) Nov. 2023 749\u2013753 https:\/\/doi.org\/10.1109\/ICCSAI59793.2023.10421298.","DOI":"10.1109\/ICCSAI59793.2023.10421298"},{"key":"e_1_2_10_67_2","doi-asserted-by":"crossref","unstructured":"Vinod MiskinS. ChandaragiP. andV WaliU. Intrusion Detection System for Electric Vehicle Charging Station 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC) Dec. 2023 1\u20137 https:\/\/doi.org\/10.1109\/ICMNWC60182.2023.10435897.","DOI":"10.1109\/ICMNWC60182.2023.10435897"},{"key":"e_1_2_10_68_2","doi-asserted-by":"crossref","unstructured":"MondalK. K. MahendiaD. DasD. andKalraS. Edge-Centric Security Framework for Electric Vehicle Connectivity: a Deep Learning Approach 2023 28th Asia Pacific Conference on Communications (APCC) Nov. 2023 448\u2013453 https:\/\/doi.org\/10.1109\/APCC60132.2023.10460656.","DOI":"10.1109\/APCC60132.2023.10460656"},{"key":"e_1_2_10_69_2","doi-asserted-by":"crossref","unstructured":"WuS. LiS. andSunW. ConvIDS: A Convolutional LSTM Based Intrusion Detection Model for In-Vehicle CAN Bus 2023 IEEE 6th International Conference on Automation Electronics and Electrical Engineering (AUTEEE) Dec. 2023 285\u2013290 https:\/\/doi.org\/10.1109\/AUTEEE60196.2023.10408040.","DOI":"10.1109\/AUTEEE60196.2023.10408040"},{"key":"e_1_2_10_70_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23218772"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jece\/5770202","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/jece\/5770202","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jece\/5770202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:37:56Z","timestamp":1773779876000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/jece\/5770202"}},"subtitle":[],"editor":[{"given":"Vito","family":"Calderaro","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/jece\/5770202"],"URL":"https:\/\/doi.org\/10.1155\/jece\/5770202","archive":["Portico"],"relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"value":"2090-0147","type":"print"},{"value":"2090-0155","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-08-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5770202"}}