{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T01:52:57Z","timestamp":1769824377022,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031686054","type":"print"},{"value":"9783031686061","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68606-1_12","type":"book-chapter","created":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:02:40Z","timestamp":1725836560000},"page":"184-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Lightweight and\u00a0Responsive On-Line IDS Towards Intelligent Connected Vehicles System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6611-5438","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-9695","authenticated-orcid":false,"given":"Wenjun","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Eng Gee","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Alexei","family":"Lisitsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"12_CR2","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOMSTD.0001.2100080","volume":"6","author":"G Costantino","year":"2022","unstructured":"Costantino, G., De Vincenzi, M., Matteucci, I.: In-depth exploration of ISO\/SAE 21434 and its correlations with existing standards. IEEE Commun. Stand. Magaz. 6(1), 84\u201392 (2022)","journal-title":"IEEE Commun. Stand. Magaz."},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.comnet.2010.10.015","volume":"55","author":"M Gerla","year":"2011","unstructured":"Gerla, M., Kleinrock, L.: Vehicular networks and the future of the mobile internet. Comput. Netw. 55(2), 457\u2013469 (2011)","journal-title":"Comput. Netw."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Gharaee, H., Hosseinvand, H.: A new feature selection ids based on genetic algorithm and SVM. In: 2016 8th International Symposium on Telecommunications (IST), pp. 139\u2013144 (2016)","DOI":"10.1109\/ISTEL.2016.7881798"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TIFS.2018.2869351","volume":"14","author":"B Groza","year":"2018","unstructured":"Groza, B., Murvay, P.S.: Efficient intrusion detection with bloom filtering in controller area networks. IEEE Trans. Inf. Forens. Secur. 14(4), 1037\u20131051 (2018)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"IM Guyon","year":"2002","unstructured":"Guyon, I.M., Weston, J., Barnhill, S.D., Vapnik, V.N.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46, 389\u2013422 (2002)","journal-title":"Mach. Learn."},{"issue":"6","key":"12_CR8","first-page":"226","volume":"4","author":"T Hoppe","year":"2009","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Applying intrusion detection to automotive it-early insights and remaining challenges. J. Inf. Assur. Secur. 4(6), 226\u2013235 (2009)","journal-title":"J. Inf. Assur. Secur."},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Jeatrakul, P., Wong, K.W., Fung, C.C.: Classification of imbalanced data by combining the complementary neural network and SMOTE algorithm. In: Wong, K.W., Mendis, B.S.U., Bouzerdoum, A. (eds.) ICONIP 2010. LNCS, vol. 6444, pp. 152\u2013159. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17534-3_19","DOI":"10.1007\/978-3-642-17534-3_19"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MCOMSTD.001.1900053","volume":"4","author":"B Ji","year":"2020","unstructured":"Ji, B., Zhang, X., Mumtaz, S., Han, C., Li, C., Wen, H., Wang, D.: Survey on the internet of vehicles: network architectures and applications. IEEE Commun. Stand. Magaz. 4(1), 34\u201341 (2020)","journal-title":"IEEE Commun. Stand. Magaz."},{"key":"12_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100652","volume":"43","author":"A Kumar","year":"2023","unstructured":"Kumar, A., Das, T.K.: Cavids: real time intrusion detection system for connected autonomous vehicles using logical analysis of data. Vehicul. Commun. 43, 100652 (2023)","journal-title":"Vehicul. Commun."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, M., Hanumanthappa, M., Kumar, T.V.S.: Intrusion detection system using decision tree algorithm. In: 2012 IEEE 14th International Conference on Communication Technology, pp. 629\u2013634 (2012)","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, M., Hanumanthappa, M., Kumar, T.S.: Intrusion detection system using decision tree algorithm. In: 2012 IEEE 14th International Conference on Communication Technology, pp. 629\u2013634. IEEE (2012)","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, H., Cho, H., Jo, H.J.: Fids: Filtering-based intrusion detection system for in-vehicle can. Intell. Automat. Soft Comput. 37(3), 2941\u20132954 (2023)","DOI":"10.32604\/iasc.2023.039992"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.ins.2020.05.130","volume":"547","author":"X Li","year":"2021","unstructured":"Li, X., Hu, Z., Xu, M., Wang, Y., Ma, J.: Transfer learning based intrusion detection scheme for internet of vehicles. Inf. Sci. 547, 119\u2013135 (2021)","journal-title":"Inf. Sci."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Fan, Y., Huang, D., Mi, B., Huang, L., et\u00a0al.: Formal model and analysis for the random event in the intelligent car with stochastic petri nets and z. Secur. Commun. Netw. 2022, 1\u201318 (2022)","DOI":"10.1155\/2022\/3288308"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1484-3","volume":"2019","author":"SF Lokman","year":"2019","unstructured":"Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive controller area network (can) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, 1\u201317 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"12_CR18","first-page":"80","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., Karimipour, H.: Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80\u201388 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Olariu, S., Weigle, M.C.: Vehicular Networks: From Theory to Practice. Chapman and Hall\/CRC (2009)","DOI":"10.1201\/9781420085891"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Panigrahi, R., et al.: A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7), 751 (2021)","DOI":"10.3390\/math9070751"},{"key":"12_CR21","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136 (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Habibi\u00a0Lashkari, A., Ghorbani, A.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"12_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182","volume":"20","author":"S Sharma","year":"2019","unstructured":"Sharma, S., Kaushik, B.: A survey on internet of vehicles: applications, security issues and solutions. Vehicul. Commun. 20, 100182 (2019)","journal-title":"Vehicul. Commun."},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Y.C., Houng, Y.C., Chen, H.X., Tseng, S.M.: Network anomaly intrusion detection based on deep learning approach. Sensors 23(4), 2171 (2023)","DOI":"10.3390\/s23042171"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Yang, L., Moubayed, A., Hamieh, I., Shami, A.: Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Yang, L., Shami, A., Stevens, G., De\u00a0Rusett, S.: LCCDE: a decision-based ensemble framework for intrusion detection in the internet of vehicles. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 3545\u20133550. IEEE (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"issue":"17","key":"12_CR28","doi-asserted-by":"publisher","first-page":"15593","DOI":"10.1109\/JIOT.2022.3151377","volume":"9","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Xun, Y., Liu, J.: Clockids: a real-time vehicle intrusion detection system based on clock skew. IEEE Internet Things J. 9(17), 15593\u201315606 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"12_CR29","doi-asserted-by":"publisher","first-page":"2377","DOI":"10.1109\/COMST.2015.2440103","volume":"17","author":"K Zheng","year":"2015","unstructured":"Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., Zhou, Y.: Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions. IEEE Commun. Surv. Tutor. 17(4), 2377\u20132396 (2015)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68606-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:04:36Z","timestamp":1725836676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68606-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031686054","9783031686061"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68606-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Florence","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"43","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.safecomp2024.unifi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}