DESIGN AND ARCHITECTURE OF PERIMETER DEFENCE INTRUSION DETECTION SYSTEMS BASED ON UGV Article Swipe
Alexandrov, Alexander
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17828534
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17828534
Defense Intrusion Detection Systems (DIDS) are specialized subsets of intrusion detection systems tailored specifically for military and national security purposes. The proposed research is focused on the design and architecture of mobile Perimeter Defense Intrusion Detection Systems (PDIDS)based on unmanned ground vehicles (UGV). Those perimeter defense systems offer a dynamic and adaptable solution for securing critical infrastructures, military bases, and other sensitive areas. This paper outlines an innovative approach to the design and architecture of such systems, emphasizing the integration of UGVs to enhance surveillance, detection, and response capabilities. Keywords: UGV, defense intrusion detection
Related Topics
Concepts
Intrusion detection system
Architecture
Host-based intrusion detection system
Intrusion prevention system
Computer security
Computer science
Systems architecture
Engineering
Intrusion
Embedded system
Anomaly-based intrusion detection system
Systems design
Perimeter
Real-time computing
Intrusion tolerance
Key (lock)
Unmanned ground vehicle
Enterprise information security architecture
Metadata
- Type
- article
- Landing Page
- https://doi.org/10.5281/zenodo.17828534
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W7109086247
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7109086247Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.17828534Digital Object Identifier
- Title
-
DESIGN AND ARCHITECTURE OF PERIMETER DEFENCE INTRUSION DETECTION SYSTEMS BASED ON UGVWork title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-12-05Full publication date if available
- Authors
-
Alexandrov, AlexanderList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.17828534Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.17828534Direct OA link when available
- Concepts
-
Intrusion detection system, Architecture, Host-based intrusion detection system, Intrusion prevention system, Computer security, Computer science, Systems architecture, Engineering, Intrusion, Embedded system, Anomaly-based intrusion detection system, Systems design, Perimeter, Real-time computing, Intrusion tolerance, Key (lock), Unmanned ground vehicle, Enterprise information security architectureTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7109086247 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.17828534 |
| ids.doi | https://doi.org/10.5281/zenodo.17828534 |
| ids.openalex | https://openalex.org/W7109086247 |
| fwci | 0.0 |
| type | article |
| title | DESIGN AND ARCHITECTURE OF PERIMETER DEFENCE INTRUSION DETECTION SYSTEMS BASED ON UGV |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12888 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.1806158572435379 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Military Strategy and Technology |
| topics[1].id | https://openalex.org/T12391 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.055879976600408554 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2204 |
| topics[1].subfield.display_name | Biomedical Engineering |
| topics[1].display_name | Artificial Immune Systems Applications |
| topics[2].id | https://openalex.org/T13371 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.0522102490067482 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2202 |
| topics[2].subfield.display_name | Aerospace Engineering |
| topics[2].display_name | Military Defense Systems Analysis |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C35525427 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8842675089836121 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[0].display_name | Intrusion detection system |
| concepts[1].id | https://openalex.org/C123657996 |
| concepts[1].level | 2 |
| concepts[1].score | 0.667090654373169 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q12271 |
| concepts[1].display_name | Architecture |
| concepts[2].id | https://openalex.org/C90936777 |
| concepts[2].level | 4 |
| concepts[2].score | 0.5274715423583984 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q917189 |
| concepts[2].display_name | Host-based intrusion detection system |
| concepts[3].id | https://openalex.org/C27061796 |
| concepts[3].level | 3 |
| concepts[3].score | 0.49305200576782227 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[3].display_name | Intrusion prevention system |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4846915900707245 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C41008148 |
| concepts[5].level | 0 |
| concepts[5].score | 0.4715670645236969 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[5].display_name | Computer science |
| concepts[6].id | https://openalex.org/C98025372 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4506780505180359 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q477538 |
| concepts[6].display_name | Systems architecture |
| concepts[7].id | https://openalex.org/C127413603 |
| concepts[7].level | 0 |
| concepts[7].score | 0.4262875020503998 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[7].display_name | Engineering |
| concepts[8].id | https://openalex.org/C158251709 |
| concepts[8].level | 2 |
| concepts[8].score | 0.41499415040016174 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q354025 |
| concepts[8].display_name | Intrusion |
| concepts[9].id | https://openalex.org/C149635348 |
| concepts[9].level | 1 |
| concepts[9].score | 0.36389389634132385 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[9].display_name | Embedded system |
| concepts[10].id | https://openalex.org/C137524506 |
| concepts[10].level | 3 |
| concepts[10].score | 0.36075249314308167 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2247688 |
| concepts[10].display_name | Anomaly-based intrusion detection system |
| concepts[11].id | https://openalex.org/C31352089 |
| concepts[11].level | 2 |
| concepts[11].score | 0.35031744837760925 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3750474 |
| concepts[11].display_name | Systems design |
| concepts[12].id | https://openalex.org/C98503990 |
| concepts[12].level | 2 |
| concepts[12].score | 0.32384228706359863 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q28474 |
| concepts[12].display_name | Perimeter |
| concepts[13].id | https://openalex.org/C79403827 |
| concepts[13].level | 1 |
| concepts[13].score | 0.2999259829521179 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[13].display_name | Real-time computing |
| concepts[14].id | https://openalex.org/C196903269 |
| concepts[14].level | 3 |
| concepts[14].score | 0.29776501655578613 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q6059063 |
| concepts[14].display_name | Intrusion tolerance |
| concepts[15].id | https://openalex.org/C26517878 |
| concepts[15].level | 2 |
| concepts[15].score | 0.29087191820144653 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[15].display_name | Key (lock) |
| concepts[16].id | https://openalex.org/C2776548393 |
| concepts[16].level | 2 |
| concepts[16].score | 0.2867802083492279 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q2031473 |
| concepts[16].display_name | Unmanned ground vehicle |
| concepts[17].id | https://openalex.org/C31139447 |
| concepts[17].level | 2 |
| concepts[17].score | 0.26850587129592896 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q5380386 |
| concepts[17].display_name | Enterprise information security architecture |
| keywords[0].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[0].score | 0.8842675089836121 |
| keywords[0].display_name | Intrusion detection system |
| keywords[1].id | https://openalex.org/keywords/architecture |
| keywords[1].score | 0.667090654373169 |
| keywords[1].display_name | Architecture |
| keywords[2].id | https://openalex.org/keywords/host-based-intrusion-detection-system |
| keywords[2].score | 0.5274715423583984 |
| keywords[2].display_name | Host-based intrusion detection system |
| keywords[3].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[3].score | 0.49305200576782227 |
| keywords[3].display_name | Intrusion prevention system |
| keywords[4].id | https://openalex.org/keywords/systems-architecture |
| keywords[4].score | 0.4506780505180359 |
| keywords[4].display_name | Systems architecture |
| keywords[5].id | https://openalex.org/keywords/intrusion |
| keywords[5].score | 0.41499415040016174 |
| keywords[5].display_name | Intrusion |
| keywords[6].id | https://openalex.org/keywords/anomaly-based-intrusion-detection-system |
| keywords[6].score | 0.36075249314308167 |
| keywords[6].display_name | Anomaly-based intrusion detection system |
| language | |
| locations[0].id | doi:10.5281/zenodo.17828534 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article-journal |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.17828534 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A2743753192 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Alexandrov, Alexander |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Alexandrov, Alexander |
| authorships[0].is_corresponding | True |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.17828534 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-06T00:00:00 |
| display_name | DESIGN AND ARCHITECTURE OF PERIMETER DEFENCE INTRUSION DETECTION SYSTEMS BASED ON UGV |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-06T23:14:57.273132 |
| primary_topic.id | https://openalex.org/T12888 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.1806158572435379 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Military Strategy and Technology |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.17828534 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article-journal |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.17828534 |
| primary_location.id | doi:10.5281/zenodo.17828534 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article-journal |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.17828534 |
| publication_date | 2025-12-05 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 48 |
| abstract_inverted_index.an | 66 |
| abstract_inverted_index.is | 23 |
| abstract_inverted_index.of | 8, 30, 74, 80 |
| abstract_inverted_index.on | 25, 38 |
| abstract_inverted_index.to | 69, 82 |
| abstract_inverted_index.The | 20 |
| abstract_inverted_index.and | 16, 28, 50, 59, 72, 86 |
| abstract_inverted_index.are | 5 |
| abstract_inverted_index.for | 14, 53 |
| abstract_inverted_index.the | 26, 70, 78 |
| abstract_inverted_index.This | 63 |
| abstract_inverted_index.UGV, | 90 |
| abstract_inverted_index.UGVs | 81 |
| abstract_inverted_index.such | 75 |
| abstract_inverted_index.Those | 43 |
| abstract_inverted_index.offer | 47 |
| abstract_inverted_index.other | 60 |
| abstract_inverted_index.paper | 64 |
| abstract_inverted_index.(DIDS) | 4 |
| abstract_inverted_index.(UGV). | 42 |
| abstract_inverted_index.areas. | 62 |
| abstract_inverted_index.bases, | 58 |
| abstract_inverted_index.design | 27, 71 |
| abstract_inverted_index.ground | 40 |
| abstract_inverted_index.mobile | 31 |
| abstract_inverted_index.Defense | 0, 33 |
| abstract_inverted_index.Systems | 3, 36 |
| abstract_inverted_index.defense | 45, 91 |
| abstract_inverted_index.dynamic | 49 |
| abstract_inverted_index.enhance | 83 |
| abstract_inverted_index.focused | 24 |
| abstract_inverted_index.subsets | 7 |
| abstract_inverted_index.systems | 11, 46 |
| abstract_inverted_index.approach | 68 |
| abstract_inverted_index.critical | 55 |
| abstract_inverted_index.military | 15, 57 |
| abstract_inverted_index.national | 17 |
| abstract_inverted_index.outlines | 65 |
| abstract_inverted_index.proposed | 21 |
| abstract_inverted_index.research | 22 |
| abstract_inverted_index.response | 87 |
| abstract_inverted_index.securing | 54 |
| abstract_inverted_index.security | 18 |
| abstract_inverted_index.solution | 52 |
| abstract_inverted_index.systems, | 76 |
| abstract_inverted_index.tailored | 12 |
| abstract_inverted_index.unmanned | 39 |
| abstract_inverted_index.vehicles | 41 |
| abstract_inverted_index.Detection | 2, 35 |
| abstract_inverted_index.Intrusion | 1, 34 |
| abstract_inverted_index.Keywords: | 89 |
| abstract_inverted_index.Perimeter | 32 |
| abstract_inverted_index.adaptable | 51 |
| abstract_inverted_index.detection | 10, 93 |
| abstract_inverted_index.intrusion | 9, 92 |
| abstract_inverted_index.perimeter | 44 |
| abstract_inverted_index.purposes. | 19 |
| abstract_inverted_index.sensitive | 61 |
| abstract_inverted_index.detection, | 85 |
| abstract_inverted_index.innovative | 67 |
| abstract_inverted_index.emphasizing | 77 |
| abstract_inverted_index.integration | 79 |
| abstract_inverted_index.specialized | 6 |
| abstract_inverted_index.(PDIDS)based | 37 |
| abstract_inverted_index.architecture | 29, 73 |
| abstract_inverted_index.specifically | 13 |
| abstract_inverted_index.capabilities. | 88 |
| abstract_inverted_index.surveillance, | 84 |
| abstract_inverted_index.infrastructures, | 56 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.79562615 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |