{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:23Z","timestamp":1742913743219,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030521899"},{"type":"electronic","value":"9783030521905"}],"license":[{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-52190-5_28","type":"book-chapter","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:06:33Z","timestamp":1597680393000},"page":"399-407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Anomaly Detection System Based on Clustering and Fuzzy Set Theory in VANETs"],"prefix":"10.1007","author":[{"given":"Marjan","family":"Kuchaki Rafsanjani","sequence":"first","affiliation":[]},{"given":"Hamideh","family":"Fatemidokht","sequence":"additional","affiliation":[]},{"given":"Valentina Emilia","family":"Balas","sequence":"additional","affiliation":[]},{"given":"Ranbir Singh","family":"Batth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Bellaiche, M., Pierre, S., Quintero, A.: VANET security surveys. Comput. Commun. 44, 1\u201313 (2014)","journal-title":"Comput. Commun."},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Thilak, K.D., Amuthan, A.: DoS attack on VANET routing and possible defending solutions-a survey. In: International Conference on Information Communication and Embedded Systems (ICICES 2016), Chennai, Tamil Nadu, India (2016)","DOI":"10.1109\/ICICES.2016.7518892"},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380\u2013392 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.jnca.2013.09.008","volume":"40","author":"BT Sharef","year":"2014","unstructured":"Sharef, B.T., Alsaqour, R.A., Ismail, M.: Vehicular communication ad hoc routing protocols: a survey. J. Netw. Comput. Appl. 40, 363\u2013396 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. In: RSA CryptoBytes (2002)","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Petit, J.: Analysis of ECDSA authentication processing in VANETs. In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/NTMS.2009.5384696"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/TDSC.2015.2399297","volume":"13","author":"C Lyu","year":"2015","unstructured":"Lyu, C., Gu, D., Zeng, Y., Mohapatra, P.: PBA: prediction-based authentication for vehicle-to-vehicle communications. IEEE Trans. Dependable Secur. Comput. 13, 71\u201383 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"28_CR8","first-page":"5","volume":"120","author":"KN Patel","year":"2015","unstructured":"Patel, K.N., Jhaveri, R.H.: Isolating packet dropping misbehavior in VANET using ant colony optimization. Int. J. Comput. Appl. 120, 5\u20139 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"28_CR9","first-page":"45","volume":"66","author":"AM Malla","year":"2013","unstructured":"Malla, A.M., Sahu, R.K.: Security attacks with an effective solution for DOS attacks in VANET. Int. J. Comput. Appl. 66, 45\u201349 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo, T., Mount, D.M., Netanyaha, N.S., Piatko, C.D., Silverman, P., Wu, A.Y.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24, 881\u2013892 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"28_CR11","unstructured":"Chen, C.Y., Ye, F.: Particle swarm optimization algorithm and its application to clustering analysis. In: IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, pp. 789\u2013794 (2004)"},{"key":"28_CR12","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1016\/j.neucom.2014.08.070","volume":"149","author":"A Karami","year":"2015","unstructured":"Karami, A., Guerrero-Zapata, M.: A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149, 1253\u20131269 (2015)","journal-title":"Neurocomputing"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338\u2013353 (1965)","journal-title":"Inf. Control"},{"key":"28_CR14","unstructured":"Hellmann, M.: Fuzzy logic introduction (2001)"},{"key":"28_CR15","volume-title":"Fuzzy Neural Networks for Real Time Control Applications","author":"E Kayacan","year":"2016","unstructured":"Kayacan, E., Ahmadieh, K.M.: Fuzzy Neural Networks for Real Time Control Applications. Elsevier, Amsterdam (2016)"},{"key":"28_CR16","unstructured":"Zadeh, L.A.: Fuzzy Logic Toolbox for use with MATLAB, MathWorks (2001)"},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.eswa.2010.08.137","volume":"38","author":"MY Su","year":"2011","unstructured":"Su, M.Y.: Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst. Appl. 38, 3492\u20133498 (2011)","journal-title":"Expert Syst. Appl."},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.nicl.2013.10.003","volume":"3","author":"MD Steenwijk","year":"2013","unstructured":"Steenwijk, M.D., Pouwels, P.J.W., Daams, M., Dalen, J.W., Caan, M.W.A., Richard, E., Barkhof, F., Vrenken, H.: Accurate white matter lesion segmentation by k nearest neighbor classification with tissue type priors (kNN-TTPs). J. Neuroimage Clin. 3, 462\u2013469 (2013)","journal-title":"J. Neuroimage Clin."},{"key":"28_CR19","volume-title":"Pattern Recognition","author":"S Theodoridis","year":"2009","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier, Amsterdam (2009)"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Raghavendar, N.S., Deka, P.C.: Support vector machine applications in the field of hydrology: a review. Appl. Soft Comput. 19, 372\u2013386 (2014)","DOI":"10.1016\/j.asoc.2014.02.002"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.1016\/j.comcom.2011.07.001","volume":"34","author":"P Sangkatsanee","year":"2011","unstructured":"Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. 34, 2227\u20132235 (2011)","journal-title":"Comput. Commun."},{"key":"28_CR22","unstructured":"UCI machine learning repository. \nhttp:\/\/mlr.cs.umass.edu\/ml\/datasets\/KDD+Cup+1999+Data"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Muniyandi, A.P., Rajeswari, R., Pajaram, P.: Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm. In: International Conference on Communication Technology and System Design, vol. 30, pp. 174\u2013182 (2012)","DOI":"10.1016\/j.proeng.2012.01.849"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52190-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:29:07Z","timestamp":1597681747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52190-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"ISBN":["9783030521899","9783030521905"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52190-5_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"18 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop Soft Computing Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sofa2018.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}