{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:09:36Z","timestamp":1771700976848,"version":"3.50.1"},"reference-count":55,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067950","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T08:21:37Z","timestamp":1754468497000},"page":"3289-3320","source":"Crossref","is-referenced-by-count":1,"title":["Forensic Analysis of Cyberattacks in Electric Vehicle Charging Systems Using Host-Level Data"],"prefix":"10.32604","volume":"85","author":[{"given":"Salam","family":"Al-E\u2019mari","sequence":"first","affiliation":[]},{"given":"Yousef","family":"Sanjalawe","sequence":"additional","affiliation":[]},{"given":"Budoor","family":"Allehyani","sequence":"additional","affiliation":[]},{"given":"Ghader","family":"Kurdi","sequence":"additional","affiliation":[]},{"given":"Sharif","family":"Makhadmeh","sequence":"additional","affiliation":[]},{"given":"Ameera","family":"Jaradat","sequence":"additional","affiliation":[]},{"given":"Duaa","family":"Hijazi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"214434","DOI":"10.1109\/ACCESS.2020.3041074","article-title":"Cybersecurity of smart electric vehicle charging: a power grid perspective","volume":"8","author":"Acharya","year":"2020","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"8881","DOI":"10.1109\/TTE.2024.3368920","article-title":"Detection of cyber attacks to mitigate their impacts on the manipulated EV charging prices","volume":"10","author":"Akbarian","year":"2024","journal-title":"IEEE Trans Transp Electrif"},{"key":"ref3","series-title":"Proceedings of the International ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications; 2023 Oct 30\u2013Nov 3","first-page":"31","article-title":"Securing the electric vehicle charging infrastructure: an in-depth analysis of vulnerabilities and countermeasures","author":"Vailoces"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3435","DOI":"10.1049\/gtd2.12275","article-title":"Exploring cybersecurity issues in 5G enabled electric vehicle charging station with deep learning","volume":"15","author":"Basnet","year":"2021","journal-title":"IET Gener Transm Distrib"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3390\/a16020075","article-title":"Intrusion detection for electric vehicle charging systems (evcs)","volume":"16","author":"ElKashlan","year":"2023","journal-title":"Algorithms"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3390\/computers14030087","article-title":"Overview on intrusion detection systems for computers networking security","volume":"14","author":"Diana","year":"2025","journal-title":"Computers"},{"key":"ref7","series-title":"2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America)","first-page":"59289","article-title":"Ransomware detection using deep learning in the SCADA system of electric vehicle charging station","author":"Basnet","year":"2021 Sep 15\u201317"},{"key":"ref8","series-title":"2024 33rd International Conference on Computer Communications and Networks (ICCCN); 2024 Jul 29\u201331","first-page":"1","article-title":"FL-EVCS: federated learning based anomaly detection for EV charging ecosystem","author":"Purohit"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"100718","DOI":"10.1016\/j.ijcip.2024.100718","article-title":"An AutoML-based security defender for industrial control systems","volume":"47","author":"Vasan","year":"2024","journal-title":"Int J Crit Infrastruct Prot"},{"key":"ref10","first-page":"100911","article-title":"Anomaly detection of adversarial cyber attacks on electric vehicle charging stations. e-Prime\u2014Adv Electr Eng Electron Energy","volume":"11","author":"Mitikiri","year":"2025","journal-title":"Electron Energy"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.30574\/wjarr.2024.23.1.2259","article-title":"Enhancing cybersecurity in onboard charging systems of electric vehicles: a MATLAB-based approach","volume":"23","author":"Chukwunweike","year":"2024","journal-title":"World J Adv Res Rev"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.trpro.2023.10.007","article-title":"Cyber attack detection and classification for integrated on-board electric vehicle chargers subject to stochastic charging coordination","volume":"70","author":"Arsalan","year":"2023","journal-title":"Transp Res Procedia"},{"key":"ref13","unstructured":"Kondu SCV. Machine learning and deep learning-based anomaly detection for electric vehicle charging infrastructure and industrial internet of things [master\u2019s thesis]. Ames, IA, USA: Iowa State University; 2024."},{"key":"ref14","unstructured":"Metere R, Neaimeh M, Morisset C, Maple C, Bellekens X, Czekster RM. Securing the electric vehicle charging infrastructure. arXiv:2105.02905. 2021. doi:10.48550\/arxiv.2105.02905."},{"key":"ref15","series-title":"2023 IEEE Power & Energy Society General Meeting (PESGM); 2023 Jul 16\u201320","first-page":"1","article-title":"Cyber-attack event analysis for EV charging stations","author":"Girdhar"},{"key":"ref16","series-title":"2020 IEEE Systems Security Symposium (SSS); 2020 Jul 1\u2013Aug 1","first-page":"1","article-title":"Cyber-physical systems forensics","author":"Mohamed"},{"key":"ref17","first-page":"301440","article-title":"Digital forensic analysis of mobile automotive maintenance applications","volume":"43","author":"Sumaila","year":"2022","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1002\/oca.3100","article-title":"Impact of fast charging station for electric vehicles with grid integration: forensic-based investigation and Archimedes optimization algorithm approach","volume":"45","author":"Singh","year":"2024","journal-title":"Optimal Control Appl Methods"},{"key":"ref19","series-title":"2024 IEEE 32nd International Requirements Engineering Conference Workshops (REW); 2024 Jun 24\u201325","first-page":"231","article-title":"Securing electric vehicle charging stations: a critical analysis of authentication vulnerabilities","author":"Stichow"},{"key":"ref20","series-title":"2025 IEEE Texas Power and Energy Conference (TPEC)","first-page":"1","article-title":"Federated learning for detecting cyber attacks in EVCS using a lightweight neural network","author":"Hussain","year":"2025 Feb 10\u201311"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3390\/smartcities8010033","article-title":"Secure electric vehicle charging infrastructure in smart cities: a blockchain-based smart contract approach","volume":"8","author":"Chowdhury","year":"2025","journal-title":"Smart Cities"},{"key":"ref22","unstructured":"Kent K, Chevalier S, Grance T. Guide to integrating forensic techniques into incident. Tech Rep 800-86. 2006 [Internet]. [cited 2025 Jul 14]. Available from: https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-86.pdf."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"100015","DOI":"10.1016\/j.array.2019.100015","article-title":"D4I-Digital forensics framework for reviewing and investigating cyber attacks","volume":"5","author":"Dimitriadis","year":"2020","journal-title":"Array"},{"key":"ref24","series-title":"IFIP Annual Conference on Data and Applications Security and Privacy; 2024 Jul 14\u201316","first-page":"171","article-title":"Enhancing EV charging station security using a multi-dimensional dataset: Cicevse2024","author":"Buedi"},{"key":"ref25","first-page":"4","article-title":"Data mining: concepts and techniques","volume":"10","author":"Mining","year":"2006","journal-title":"Morgan Kaufinann"},{"key":"ref26","first-page":"2825","article-title":"Scikit-learn: machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref27","author":"Kelleher","year":"2019","journal-title":"The massachusetts institute of technology"},{"key":"ref28","series-title":"2019 IEEE International Conference on Big Data (Big Data); 2019 Dec 9\u201312","first-page":"3232","article-title":"Worth the Wait? Time window feature optimization for attack classification","author":"Wilson"},{"key":"ref29","series-title":"International Conference on Principles of Security and Trust","first-page":"285","article-title":"Time-dependent analysis of attacks","author":"Arnold","year":"2014"},{"key":"ref30","first-page":"6","article-title":"Performance analysis of branch prediction unit for pipelined processors","volume":"128","author":"Panwar","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref31","series-title":"Proceedings 2000 International Conference on Parallel Architectures and Compilation Techniques; 2000 Oct 15\u201319","first-page":"189","article-title":"The effect of code reordering on branch prediction","author":"Ramirez"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"4133","DOI":"10.1109\/TIFS.2021.3098162","article-title":"Detection of message injection attacks onto the can bus using similarities of successive messages-sequence graphs","volume":"16","author":"Jedh","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref33","series-title":"Proceedings of the 16th ACM International Conference on Computing Frontiers; 2019 Apr 30\u2013May 2","first-page":"32","article-title":"Cacheguard: a security-enhanced directory architecture against continuous attacks","author":"Wang"},{"key":"ref34","series-title":"Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop; 2019 Nov 15","first-page":"55","article-title":"Adaptive caches as a defense mechanism against cache side-channel attacks","author":"Bandara"},{"key":"ref35","series-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","first-page":"1","article-title":"Fast, robust and accurate detection of cache-based spectre attack phases","author":"Pashrashid"},{"key":"ref36","series-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security; 2017 Apr 2\u20136; Abu Dhabi, United Arab Emirates","first-page":"253","article-title":"Dos attacks on your memory in cloud","author":"Zhang"},{"key":"ref37","series-title":"2011 International Conference on Parallel Architectures and Compilation Techniques; 2011 Oct 10\u201314","first-page":"340","article-title":"Didi: mitigating the performance impact of TLB shootdowns using a shared TLB directory","author":"Villavieja"},{"key":"ref38","series-title":"The Twelfth International Symposium on High-Performance Computer Architecture; 2006 Feb 11\u201315","first-page":"222","article-title":"InfoShield: a security architecture for protecting information usage in memory","author":"Shi"},{"key":"ref39","first-page":"3003","article-title":"An asset-based approach to mitigate zero-day ransomware attacks","volume":"73","author":"Azzedin","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref40","series-title":"6th LCI International Conference on Linux Cluster; 2005 Apr 25\u201328","article-title":"Detection of privilege escalation for linux cluster security","author":"Treaster"},{"key":"ref41","series-title":"Work-in-Progress Proceedings ECRTS\u201917; 2017 Jun 27\u201330","first-page":"1","article-title":"Improving security for time-triggered real-time systems against timing inference based attacks by schedule obfuscation","author":"Kr\u00fcger"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"4213","DOI":"10.1002\/sec.1337","article-title":"Data correlation-based analysis methods for automatic memory forensic","volume":"8","author":"Fu","year":"2015","journal-title":"Secur Commun Netw"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput Surv"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"Ahmed","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref45","author":"Heckler","year":"2005","journal-title":"Applied multivariate statistical analysis"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1201\/9781315140919","author":"Silverman","year":"2018","journal-title":"Density estimation for statistics and data analysis"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"4840","DOI":"10.1016\/j.eswa.2014.12.028","article-title":"Two approaches for novelty detection using random forest","volume":"42","author":"Zhou","year":"2015","journal-title":"Exp Syst Appl"},{"key":"ref48","series-title":"CEUR workshop proceedings","first-page":"85","article-title":"SVM-based technique for mobile malware detection","author":"Lysenko","year":"2019"},{"key":"ref49","series-title":"2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA); 2020 Mar 5\u20137","first-page":"711","article-title":"Distributed denial of service attack detection using na\u00efve bayes and K-Nearest neighbor for network forensics","author":"Kachavimath"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"536","DOI":"10.25046\/aj050566","article-title":"Malware classification using XGboost-Gradient boosted decision tree","volume":"5","author":"Kumar","year":"2020","journal-title":"Adv Sci Technol Eng Syst"},{"key":"ref51","volume":"1684","author":"Pan","year":"2020","journal-title":"Journal of Physics: Conference Series"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"103512","DOI":"10.1016\/j.cose.2023.103512","article-title":"Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform","volume":"135","author":"Al-E\u2019mari","year":"2023","journal-title":"Comput Secur"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"98516","DOI":"10.1109\/ACCESS.2023.3313630","article-title":"Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks","volume":"11","author":"Sanjalawe","year":"2023","journal-title":"IEEE Access"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"10092","DOI":"10.1038\/s41598-025-92895-9","article-title":"Detection of cyber attacks in electric vehicle charging systems using a remaining useful life generative adversarial network","volume":"15","author":"Tany\u0131ld\u0131z","year":"2025","journal-title":"Sci Rep"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/s10586-025-05152-z","article-title":"Federated deep learning for enhanced prediction of electric vehicle charging station availability","volume":"28","author":"Douaidi","year":"2025","journal-title":"Cluster Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67950\/TSP_CMC_67950.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:42Z","timestamp":1764826542000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":55,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067950","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}